fffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f00000000c0)=0x14) 19:41:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x10) 19:41:29 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)) lremovexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='system.posix_acl_access\x00') [ 750.119673] audit: type=1326 audit(1529696489.039:1628): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15067 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:41:29 executing program 1: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000080)=""/77) 19:41:29 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f00000000c0)=0x14) 19:41:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000100)) lremovexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='system.posix_acl_access\x00') 19:41:29 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000002c0)}) listen(0xffffffffffffffff, 0x0) 19:41:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x10) 19:41:29 executing program 1: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000080)=""/77) 19:41:29 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f00000000c0)=0x14) 19:41:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000100)) lremovexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='system.posix_acl_access\x00') 19:41:29 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) unlink(&(0x7f0000000200)='./file0\x00') 19:41:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socket$inet6_udp(0xa, 0x2, 0x0) 19:41:29 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00'}, 0x10) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000200)=""/202) [ 750.937574] audit: type=1326 audit(1529696489.936:1629): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15113 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:41:30 executing program 1: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000080)=""/77) [ 751.012413] audit: type=1326 audit(1529696489.961:1630): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15118 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:41:30 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f00000000c0)=0x14) 19:41:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000100)) lremovexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='system.posix_acl_access\x00') 19:41:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x10) 19:41:30 executing program 1: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000080)=""/77) 19:41:30 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f00000000c0)=0x14) 19:41:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)) lremovexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='system.posix_acl_access\x00') 19:41:30 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00'}, 0x10) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000200)=""/202) 19:41:30 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000002c0)}) listen(0xffffffffffffffff, 0x0) 19:41:30 executing program 7: socketpair(0x0, 0x0, 0x0, &(0x7f0000000200)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x10) 19:41:30 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000080)=""/77) 19:41:30 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f00000000c0)=0x14) 19:41:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)) lremovexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='system.posix_acl_access\x00') 19:41:30 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00'}, 0x10) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000200)=""/202) 19:41:30 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socket$inet6_udp(0xa, 0x2, 0x0) 19:41:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x10006, 0x0, 0x0, 0x2000000501f8}]}) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)) keyctl$set_timeout(0xf, 0x0, 0x0) 19:41:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f00000000c0)=0x14) 19:41:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)) lremovexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='system.posix_acl_access\x00') 19:41:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000080)=""/77) 19:41:31 executing program 7: socketpair(0x0, 0x0, 0x0, &(0x7f0000000200)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x10) 19:41:31 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00'}, 0x10) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000200)=""/202) 19:41:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) 19:41:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f00000000c0)=0x14) 19:41:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000100)) lremovexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='system.posix_acl_access\x00') 19:41:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) 19:41:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000080)=""/77) 19:41:31 executing program 7: socketpair(0x0, 0x0, 0x0, &(0x7f0000000200)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x10) 19:41:31 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000200)=""/202) 19:41:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f00000000c0)=0x14) 19:41:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f00000001c0)) 19:41:31 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@ipv4={[], [], @multicast1}, @in=@loopback}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f0000000100)=0xe8) setfsuid(0x0) 19:41:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f00000000c0)=0x14) 19:41:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000080)=""/77) 19:41:32 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000200)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x10) 19:41:32 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000200)=""/202) 19:41:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) 19:41:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000240)={0x0, 0x0, 'client1\x00', 0x0, 'Ikr~Ux,U', "4e148cd6b207a3f7fc989fdb3587af4568d951068208e6e771e2b811fc6ae961"}) 19:41:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f00000000c0)=0x14) 19:41:32 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@ipv4={[], [], @multicast1}, @in=@loopback}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f0000000100)=0xe8) setfsuid(0x0) 19:41:32 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000100)) lremovexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='system.posix_acl_access\x00') 19:41:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000080)=""/77) 19:41:32 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000200)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x10) 19:41:32 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000200)=""/202) 19:41:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) [ 753.362939] kauditd_printk_skb: 4 callbacks suppressed [ 753.362966] audit: type=1326 audit(1529696492.361:1635): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15265 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:41:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f00000000c0)=0x14) 19:41:32 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@ipv4={[], [], @multicast1}, @in=@loopback}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f0000000100)=0xe8) setfsuid(0x0) 19:41:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000080)=""/77) 19:41:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000240)={0x0, 0x0, 'client1\x00', 0x0, 'Ikr~Ux,U', "4e148cd6b207a3f7fc989fdb3587af4568d951068208e6e771e2b811fc6ae961"}) 19:41:32 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000200)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x10) 19:41:32 executing program 0: bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00'}, 0x10) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000200)=""/202) 19:41:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) 19:41:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f00000000c0)=0x14) 19:41:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000080)=""/77) 19:41:32 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@ipv4={[], [], @multicast1}, @in=@loopback}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f0000000100)=0xe8) setfsuid(0x0) 19:41:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000240)={0x0, 0x0, 'client1\x00', 0x0, 'Ikr~Ux,U', "4e148cd6b207a3f7fc989fdb3587af4568d951068208e6e771e2b811fc6ae961"}) [ 753.780913] audit: type=1326 audit(1529696492.779:1636): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15305 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 753.884748] audit: type=1326 audit(1529696492.860:1637): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15309 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:41:33 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000100)) lremovexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='system.posix_acl_access\x00') 19:41:33 executing program 0: bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00'}, 0x10) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000200)=""/202) 19:41:33 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000200)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x10) 19:41:33 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) 19:41:33 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) setfsuid(0x0) 19:41:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000240)={0x0, 0x0, 'client1\x00', 0x0, 'Ikr~Ux,U', "4e148cd6b207a3f7fc989fdb3587af4568d951068208e6e771e2b811fc6ae961"}) [ 754.309800] audit: type=1326 audit(1529696493.308:1638): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15329 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:41:33 executing program 0: bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00'}, 0x10) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000200)=""/202) 19:41:33 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) 19:41:33 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) setfsuid(0x0) 19:41:33 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000200)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x10) 19:41:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000240)={0x0, 0x0, 'client1\x00', 0x0, 'Ikr~Ux,U', "4e148cd6b207a3f7fc989fdb3587af4568d951068208e6e771e2b811fc6ae961"}) 19:41:33 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00'}, 0x10) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000200)=""/202) 19:41:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f00000000c0)=0x14) 19:41:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000080)=""/77) 19:41:33 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) setfsuid(0x0) 19:41:33 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) [ 754.757239] audit: type=1326 audit(1529696493.756:1639): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15358 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 754.819162] audit: type=1326 audit(1529696493.817:1640): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15367 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:41:34 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) 19:41:34 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00'}, 0x10) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000200)=""/202) 19:41:34 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000240)={0x0, 0x0, 'client1\x00', 0x0, 'Ikr~Ux,U', "4e148cd6b207a3f7fc989fdb3587af4568d951068208e6e771e2b811fc6ae961"}) 19:41:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000200)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x10) 19:41:34 executing program 6: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@ipv4={[], [], @multicast1}, @in=@loopback}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f0000000100)=0xe8) setfsuid(0x0) 19:41:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={{0x77359400}, {0x77359400}}) 19:41:34 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) 19:41:34 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00'}, 0x10) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000200)=""/202) 19:41:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000200)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x10) 19:41:34 executing program 6: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@ipv4={[], [], @multicast1}, @in=@loopback}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f0000000100)=0xe8) setfsuid(0x0) 19:41:34 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000240)={0x0, 0x0, 'client1\x00', 0x0, 'Ikr~Ux,U', "4e148cd6b207a3f7fc989fdb3587af4568d951068208e6e771e2b811fc6ae961"}) 19:41:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={{0x77359400}, {0x77359400}}) 19:41:34 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f00000000c0)=0x14) 19:41:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000080)=""/77) 19:41:34 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) 19:41:34 executing program 6: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@ipv4={[], [], @multicast1}, @in=@loopback}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f0000000100)=0xe8) setfsuid(0x0) 19:41:34 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00'}, 0x10) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000200)=""/202) 19:41:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000200)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x10) 19:41:34 executing program 2: dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000240)={0x0, 0x0, 'client1\x00', 0x0, 'Ikr~Ux,U', "4e148cd6b207a3f7fc989fdb3587af4568d951068208e6e771e2b811fc6ae961"}) 19:41:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={{0x77359400}, {0x77359400}}) [ 755.708260] audit: type=1326 audit(1529696494.706:1641): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15414 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 755.783979] audit: type=1326 audit(1529696494.779:1642): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15417 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:41:34 executing program 5: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) 19:41:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000200)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x10) 19:41:34 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00'}, 0x10) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000200)=""/202) 19:41:34 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@ipv4={[], [], @multicast1}, @in=@loopback}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f0000000100)=0xe8) setfsuid(0x0) 19:41:34 executing program 2: dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000240)={0x0, 0x0, 'client1\x00', 0x0, 'Ikr~Ux,U', "4e148cd6b207a3f7fc989fdb3587af4568d951068208e6e771e2b811fc6ae961"}) 19:41:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={{0x77359400}, {0x77359400}}) 19:41:35 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@ipv4={[], [], @multicast1}, @in=@loopback}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f0000000100)=0xe8) setfsuid(0x0) 19:41:35 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00'}, 0x10) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000200)=""/202) 19:41:35 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00'}, 0x10) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000200)=""/202) 19:41:35 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00'}, 0x10) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000200)=""/202) 19:41:35 executing program 5: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) 19:41:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000200)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x10) 19:41:35 executing program 2: dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000240)={0x0, 0x0, 'client1\x00', 0x0, 'Ikr~Ux,U', "4e148cd6b207a3f7fc989fdb3587af4568d951068208e6e771e2b811fc6ae961"}) 19:41:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={{0x77359400}, {0x77359400}}) 19:41:35 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@ipv4={[], [], @multicast1}, @in=@loopback}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f0000000100)=0xe8) setfsuid(0x0) 19:41:35 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) 19:41:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 756.731579] audit: type=1326 audit(1529696495.730:1643): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15469 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:41:35 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@ipv4={[], [], @multicast1}, @in=@loopback}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f0000000100)=0xe8) setfsuid(0x0) 19:41:35 executing program 5: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) 19:41:35 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000240)={0x0, 0x0, 'client1\x00', 0x0, 'Ikr~Ux,U', "4e148cd6b207a3f7fc989fdb3587af4568d951068208e6e771e2b811fc6ae961"}) 19:41:35 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00'}, 0x10) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000200)=""/202) 19:41:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 19:41:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={{0x77359400}, {0x77359400}}) 19:41:35 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000001300)) 19:41:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) 19:41:36 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@ipv4={[], [], @multicast1}, @in=@loopback}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f0000000100)=0xe8) setfsuid(0x0) 19:41:36 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000240)={0x0, 0x0, 'client1\x00', 0x0, 'Ikr~Ux,U', "4e148cd6b207a3f7fc989fdb3587af4568d951068208e6e771e2b811fc6ae961"}) 19:41:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000200)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x10) 19:41:36 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00'}, 0x10) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000200)=""/202) 19:41:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={{0x77359400}, {0x77359400}}) 19:41:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 19:41:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) 19:41:36 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@ipv4={[], [], @multicast1}, @in=@loopback}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f0000000100)=0xe8) setfsuid(0x0) 19:41:36 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000240)={0x0, 0x0, 'client1\x00', 0x0, 'Ikr~Ux,U', "4e148cd6b207a3f7fc989fdb3587af4568d951068208e6e771e2b811fc6ae961"}) 19:41:36 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000001300)) [ 757.625881] audit: type=1326 audit(1529696496.624:1644): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15525 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:41:36 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@ipv4={[], [], @multicast1}, @in=@loopback}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f0000000100)=0xe8) setfsuid(0x0) 19:41:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000240)={0x0, 0x0, 'client1\x00', 0x0, 'Ikr~Ux,U', "4e148cd6b207a3f7fc989fdb3587af4568d951068208e6e771e2b811fc6ae961"}) 19:41:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) 19:41:36 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={{0x77359400}, {0x77359400}}) 19:41:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 19:41:36 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000001300)) 19:41:36 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@ipv4={[], [], @multicast1}, @in=@loopback}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f0000000100)=0xe8) setfsuid(0x0) 19:41:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) 19:41:37 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000200)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x10) 19:41:37 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00'}, 0x10) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000200)=""/202) 19:41:37 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={{0x77359400}, {0x77359400}}) 19:41:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000240)={0x0, 0x0, 'client1\x00', 0x0, 'Ikr~Ux,U', "4e148cd6b207a3f7fc989fdb3587af4568d951068208e6e771e2b811fc6ae961"}) 19:41:37 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@ipv4={[], [], @multicast1}, @in=@loopback}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f0000000100)=0xe8) setfsuid(0x0) 19:41:37 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000001300)) 19:41:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 19:41:37 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) [ 758.550832] kauditd_printk_skb: 1 callbacks suppressed [ 758.550853] audit: type=1326 audit(1529696497.549:1646): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15574 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:41:37 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) [ 758.666057] audit: type=1326 audit(1529696497.664:1647): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15590 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:41:37 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@ipv4={[], [], @multicast1}, @in=@loopback}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f0000000100)=0xe8) setfsuid(0x0) 19:41:37 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={{0x77359400}, {0x77359400}}) 19:41:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000240)={0x0, 0x0, 'client1\x00', 0x0, 'Ikr~Ux,U', "4e148cd6b207a3f7fc989fdb3587af4568d951068208e6e771e2b811fc6ae961"}) 19:41:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 19:41:37 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000001300)) [ 758.826787] audit: type=1326 audit(1529696497.825:1648): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15597 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:41:37 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={{0x77359400}, {0x77359400}}) 19:41:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000240)={0x0, 0x0, 'client1\x00', 0x0, 'Ikr~Ux,U', "4e148cd6b207a3f7fc989fdb3587af4568d951068208e6e771e2b811fc6ae961"}) 19:41:38 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 19:41:38 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00'}, 0x10) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000200)=""/202) 19:41:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) 19:41:38 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000001300)) 19:41:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000240)={0x0, 0x0, 'client1\x00', 0x0, 'Ikr~Ux,U', "4e148cd6b207a3f7fc989fdb3587af4568d951068208e6e771e2b811fc6ae961"}) 19:41:38 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={{0x77359400}, {0x77359400}}) 19:41:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'icmp6\x00'}, &(0x7f00000000c0)=0x1e) 19:41:38 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 759.581052] audit: type=1326 audit(1529696498.579:1649): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15627 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:41:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000240)={0x0, 0x0, 'client1\x00', 0x0, 'Ikr~Ux,U', "4e148cd6b207a3f7fc989fdb3587af4568d951068208e6e771e2b811fc6ae961"}) [ 759.659100] audit: type=1326 audit(1529696498.626:1650): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15634 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:41:38 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@ipv4={[], [], @multicast1}, @in=@loopback}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f0000000100)=0xe8) setfsuid(0x0) 19:41:38 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={{0x77359400}, {0x77359400}}) 19:41:38 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 19:41:38 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000001300)) 19:41:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'icmp6\x00'}, &(0x7f00000000c0)=0x1e) 19:41:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket$inet_icmp_raw(0x2, 0x3, 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={{0x77359400}, {0x77359400}}) 19:41:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000240)={0x0, 0x0, 'client1\x00', 0x0, 'Ikr~Ux,U', "4e148cd6b207a3f7fc989fdb3587af4568d951068208e6e771e2b811fc6ae961"}) [ 759.886848] audit: type=1326 audit(1529696498.885:1651): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15655 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:41:39 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 759.996593] audit: type=1326 audit(1529696498.995:1652): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15665 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:41:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket$inet_icmp_raw(0x2, 0x3, 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={{0x77359400}, {0x77359400}}) 19:41:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) 19:41:39 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000001300)) 19:41:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'icmp6\x00'}, &(0x7f00000000c0)=0x1e) 19:41:39 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 19:41:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) getpgrp(0xffffffffffffffff) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}}) 19:41:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket$inet_icmp_raw(0x2, 0x3, 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={{0x77359400}, {0x77359400}}) 19:41:39 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 760.631354] audit: type=1326 audit(1529696499.629:1653): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15692 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:41:39 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@ipv4={[], [], @multicast1}, @in=@loopback}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f0000000100)=0xe8) setfsuid(0x0) 19:41:39 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000001300)) 19:41:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={{0x77359400}, {0x77359400}}) 19:41:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'icmp6\x00'}, &(0x7f00000000c0)=0x1e) 19:41:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) getpgrp(0xffffffffffffffff) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}}) 19:41:39 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 760.855675] audit: type=1326 audit(1529696499.854:1654): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15707 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:41:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000240)={0x0, 0x0, 'client1\x00', 0x0, 'Ikr~Ux,U', "4e148cd6b207a3f7fc989fdb3587af4568d951068208e6e771e2b811fc6ae961"}) 19:41:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={{0x77359400}, {0x77359400}}) 19:41:39 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000001300)) [ 761.034786] audit: type=1326 audit(1529696500.033:1655): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15723 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:41:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'icmp6\x00'}, &(0x7f00000000c0)=0x1e) 19:41:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) 19:41:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 19:41:40 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) getpgrp(0xffffffffffffffff) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}}) 19:41:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={{0x77359400}, {0x77359400}}) 19:41:40 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000001300)) 19:41:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={{0x77359400}, {0x77359400}}) 19:41:40 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) userfaultfd(0x0) 19:41:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 19:41:40 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000001300)) 19:41:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'icmp6\x00'}, &(0x7f00000000c0)=0x1e) 19:41:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000005017a}]}) socket$inet(0x2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000180)) 19:41:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 19:41:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000240)={0x0, 0x0, 'client1\x00', 0x0, 'Ikr~Ux,U', "4e148cd6b207a3f7fc989fdb3587af4568d951068208e6e771e2b811fc6ae961"}) 19:41:40 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000001300)) 19:41:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'icmp6\x00'}, &(0x7f00000000c0)=0x1e) 19:41:40 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) userfaultfd(0x0) 19:41:41 executing program 7: socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'icmp6\x00'}, &(0x7f00000000c0)=0x1e) 19:41:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000005017a}]}) socket$inet(0x2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000180)) 19:41:41 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000001300)) 19:41:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 19:41:41 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) userfaultfd(0x0) 19:41:41 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={{0x77359400}, {0x77359400}}) 19:41:41 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000080)={@dev={0xfe, 0x80}}, 0x14) 19:41:41 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000001300)) 19:41:41 executing program 7: socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'icmp6\x00'}, &(0x7f00000000c0)=0x1e) 19:41:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 19:41:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000005017a}]}) socket$inet(0x2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000180)) 19:41:41 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) userfaultfd(0x0) 19:41:41 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) userfaultfd(0x0) 19:41:41 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000080)={@dev={0xfe, 0x80}}, 0x14) 19:41:41 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000001300)) 19:41:41 executing program 7: socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'icmp6\x00'}, &(0x7f00000000c0)=0x1e) 19:41:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 19:41:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000005017a}]}) socket$inet(0x2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000180)) 19:41:41 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='scalable\x00', 0x9) 19:41:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 19:41:42 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) userfaultfd(0x0) 19:41:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={{0x77359400}, {0x77359400}}) 19:41:42 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'icmp6\x00'}, &(0x7f00000000c0)=0x1e) 19:41:42 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000001300)) 19:41:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000005017a}]}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000180)) 19:41:42 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000080)={@dev={0xfe, 0x80}}, 0x14) 19:41:42 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='scalable\x00', 0x9) 19:41:42 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) userfaultfd(0x0) 19:41:42 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000001300)) [ 763.656797] kauditd_printk_skb: 5 callbacks suppressed [ 763.656817] audit: type=1326 audit(1529696502.655:1661): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15868 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:41:42 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'icmp6\x00'}, &(0x7f00000000c0)=0x1e) 19:41:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000005017a}]}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000180)) 19:41:42 executing program 0: openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) userfaultfd(0x0) 19:41:42 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='scalable\x00', 0x9) 19:41:42 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000080)={@dev={0xfe, 0x80}}, 0x14) 19:41:42 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000001300)) 19:41:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 19:41:43 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'icmp6\x00'}, &(0x7f00000000c0)=0x1e) [ 764.112191] audit: type=1326 audit(1529696503.110:1662): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15898 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:41:43 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000005017a}]}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000180)) 19:41:43 executing program 0: openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) userfaultfd(0x0) 19:41:43 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000001300)) 19:41:43 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='scalable\x00', 0x9) 19:41:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f0000000040)=0x10) 19:41:43 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000080)={@dev={0xfe, 0x80}}, 0x14) 19:41:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'icmp6\x00'}, &(0x7f00000000c0)=0x1e) [ 764.604159] audit: type=1326 audit(1529696503.602:1663): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15905 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:41:43 executing program 6: socket$inet(0x2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000180)) 19:41:43 executing program 0: openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) userfaultfd(0x0) 19:41:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'icmp6\x00'}, &(0x7f00000000c0)=0x1e) 19:41:43 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='scalable\x00', 0x9) 19:41:43 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000080)={@dev={0xfe, 0x80}}, 0x14) 19:41:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f0000000040)=0x10) 19:41:43 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='scalable\x00', 0x9) 19:41:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 19:41:44 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) userfaultfd(0x0) 19:41:44 executing program 6: socket$inet(0x2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000180)) 19:41:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'icmp6\x00'}, &(0x7f00000000c0)=0x1e) [ 765.124331] audit: type=1326 audit(1529696504.123:1664): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15953 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:41:44 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000001300)) 19:41:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f0000000040)=0x10) 19:41:44 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000080)={@dev={0xfe, 0x80}}, 0x14) 19:41:44 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='scalable\x00', 0x9) 19:41:44 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) userfaultfd(0x0) 19:41:44 executing program 6: socket$inet(0x2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000180)) 19:41:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'icmp6\x00'}, &(0x7f00000000c0)=0x1e) [ 765.546668] audit: type=1326 audit(1529696504.545:1665): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15980 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:41:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'icmp6\x00'}, &(0x7f00000000c0)=0x1e) 19:41:44 executing program 2: socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='scalable\x00', 0x9) 19:41:44 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) userfaultfd(0x0) 19:41:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f0000000040)=0x10) 19:41:44 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000080)={@dev={0xfe, 0x80}}, 0x14) 19:41:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f0000000040)=0x10) 19:41:45 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000005017a}]}) socket$inet(0x2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000180)) 19:41:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'icmp6\x00'}, &(0x7f00000000c0)=0x1e) 19:41:45 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) userfaultfd(0x0) 19:41:45 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000100)) 19:41:45 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000001300)) 19:41:45 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000080)={@dev={0xfe, 0x80}}, 0x14) 19:41:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'icmp6\x00'}, &(0x7f00000000c0)=0x1e) 19:41:45 executing program 2: socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='scalable\x00', 0x9) 19:41:45 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000005017a}]}) socket$inet(0x2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000180)) 19:41:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f0000000040)=0x10) 19:41:45 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) userfaultfd(0x0) [ 766.500944] audit: type=1326 audit(1529696505.499:1666): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16028 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:41:45 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) userfaultfd(0x0) [ 766.574044] audit: type=1326 audit(1529696505.547:1667): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16040 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:41:45 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000080)={@dev={0xfe, 0x80}}, 0x14) 19:41:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f0000000040)=0x10) 19:41:45 executing program 2: socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='scalable\x00', 0x9) 19:41:45 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000005017a}]}) socket$inet(0x2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000180)) 19:41:45 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000100)) 19:41:45 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) userfaultfd(0x0) 19:41:45 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000080)={@dev={0xfe, 0x80}}, 0x14) 19:41:45 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f0000000040)=0x10) 19:41:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'icmp6\x00'}, &(0x7f00000000c0)=0x1e) 19:41:46 executing program 2: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='scalable\x00', 0x9) 19:41:46 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000100)) 19:41:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000180)) 19:41:46 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) userfaultfd(0x0) 19:41:46 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280), 0x0) 19:41:46 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000080)={@dev={0xfe, 0x80}}, 0x14) 19:41:46 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f0000000040)=0x10) [ 767.485152] audit: type=1326 audit(1529696506.483:1668): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16091 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:41:46 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000080)={@dev={0xfe, 0x80}}, 0x14) 19:41:46 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f0000000040)=0x10) 19:41:46 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) userfaultfd(0x0) 19:41:46 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000100)) 19:41:46 executing program 2: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='scalable\x00', 0x9) 19:41:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000180)) 19:41:46 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280), 0x0) 19:41:46 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000080)={@dev={0xfe, 0x80}}, 0x14) 19:41:47 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'icmp6\x00'}, &(0x7f00000000c0)=0x1e) 19:41:47 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f0000000040)=0x10) 19:41:47 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) userfaultfd(0x0) 19:41:47 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000100)) 19:41:47 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280), 0x0) 19:41:47 executing program 2: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='scalable\x00', 0x9) 19:41:47 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000180)) 19:41:47 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000080)={@dev={0xfe, 0x80}}, 0x14) [ 768.450557] audit: type=1326 audit(1529696507.449:1669): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16147 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:41:47 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000080)={@dev={0xfe, 0x80}}, 0x14) 19:41:47 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000100)) [ 768.528450] audit: type=1326 audit(1529696507.474:1670): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16145 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:41:47 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000005017a}]}) socket$inet(0x2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000180)) 19:41:47 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f0000000040)=0x10) 19:41:47 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280), 0x0) 19:41:47 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='scalable\x00', 0x9) 19:41:47 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000080)={@dev={0xfe, 0x80}}, 0x14) 19:41:47 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f0000000040)=0x10) 19:41:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f0000000040)=0x10) 19:41:48 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000100)) 19:41:48 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) userfaultfd(0x0) 19:41:48 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280), 0x0) 19:41:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000005017a}]}) socket$inet(0x2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000180)) 19:41:48 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000080)={@dev={0xfe, 0x80}}, 0x14) 19:41:48 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='scalable\x00', 0x9) 19:41:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f0000000040)=0x10) [ 769.444527] audit: type=1326 audit(1529696508.441:1671): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16216 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:41:48 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000080)={@dev={0xfe, 0x80}}, 0x14) 19:41:48 executing program 4: get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000100)) 19:41:48 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='scalable\x00', 0x9) 19:41:48 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280), 0x0) 19:41:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000005017a}]}) socket$inet(0x2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000180)) 19:41:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f0000000040)=0x10) 19:41:48 executing program 4: get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000100)) 19:41:48 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000080)={@dev={0xfe, 0x80}}, 0x14) 19:41:48 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280), 0x0) 19:41:48 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='scalable\x00', 0x9) [ 769.791197] audit: type=1326 audit(1529696508.789:1672): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16246 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:41:49 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) userfaultfd(0x0) 19:41:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f0000000040)=0x10) 19:41:49 executing program 4: get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000100)) 19:41:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000180)) 19:41:49 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280), 0x0) 19:41:49 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='scalable\x00', 0x9) 19:41:49 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) timer_create(0x0, &(0x7f0000000180), &(0x7f00000001c0)) timer_delete(0x0) [ 770.364670] audit: type=1326 audit(1529696509.362:1673): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16265 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:41:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f0000000040)=0x10) [ 770.427848] audit: type=1326 audit(1529696509.383:1674): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16267 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:41:49 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000100)) 19:41:49 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280), 0x0) 19:41:49 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='scalable\x00', 0x9) 19:41:49 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) timer_create(0x0, &(0x7f0000000180), &(0x7f00000001c0)) timer_delete(0x0) 19:41:49 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000100)) 19:41:49 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000080)={@dev={0xfe, 0x80}}, 0x14) 19:41:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f0000000040)=0x10) 19:41:49 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280), 0x0) [ 770.849157] audit: type=1326 audit(1529696509.847:1675): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16311 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:41:50 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000180)) 19:41:50 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) timer_create(0x0, &(0x7f0000000180), &(0x7f00000001c0)) timer_delete(0x0) 19:41:50 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='scalable\x00', 0x9) 19:41:50 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280), 0x0) 19:41:50 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000100)) 19:41:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f0000000040)=0x10) 19:41:50 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) [ 771.333822] audit: type=1326 audit(1529696510.332:1676): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16324 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:41:50 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280), 0x0) 19:41:50 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000100)) [ 771.389522] audit: type=1326 audit(1529696510.353:1677): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16323 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 771.409377] audit: type=1326 audit(1529696510.375:1678): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16326 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:41:50 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) timer_create(0x0, &(0x7f0000000180), &(0x7f00000001c0)) timer_delete(0x0) 19:41:50 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 19:41:50 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280), 0x0) 19:41:50 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000100)) 19:41:50 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000080)={@dev={0xfe, 0x80}}, 0x14) 19:41:50 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) timer_delete(0x0) 19:41:50 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280), 0x0) [ 771.838528] audit: type=1326 audit(1529696510.837:1679): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16365 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:41:51 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000180)) 19:41:51 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000100)) 19:41:51 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='scalable\x00', 0x9) 19:41:51 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 19:41:51 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280), 0x0) 19:41:51 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) timer_delete(0x0) 19:41:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f0000000040)=0x10) [ 772.291310] audit: type=1326 audit(1529696511.290:1680): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16374 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:41:51 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280), 0x0) 19:41:51 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 19:41:51 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000100)) 19:41:51 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) timer_delete(0x0) 19:41:51 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280), 0x0) 19:41:51 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000100)) 19:41:51 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000100)) 19:41:51 executing program 7: timer_create(0x0, &(0x7f0000000180), &(0x7f00000001c0)) timer_delete(0x0) 19:41:51 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 19:41:52 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 19:41:52 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280), 0x0) 19:41:52 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='scalable\x00', 0x9) 19:41:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000000)) 19:41:52 executing program 7: timer_create(0x0, &(0x7f0000000180), &(0x7f00000001c0)) timer_delete(0x0) 19:41:52 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000100)) 19:41:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f0000000040)=0x10) 19:41:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180)) setgroups(0x0, &(0x7f0000000240)) 19:41:52 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280), 0x0) 19:41:52 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 19:41:52 executing program 7: timer_create(0x0, &(0x7f0000000180), &(0x7f00000001c0)) timer_delete(0x0) 19:41:52 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280), 0x0) 19:41:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000000)) 19:41:52 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 19:41:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180)) setgroups(0x0, &(0x7f0000000240)) 19:41:52 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) timer_create(0x0, &(0x7f0000000180), &(0x7f00000001c0)) timer_delete(0x0) 19:41:52 executing program 0: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 19:41:52 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) timer_create(0x0, &(0x7f0000000180), &(0x7f00000001c0)) timer_delete(0x0) 19:41:53 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) timer_create(0x0, &(0x7f0000000180), &(0x7f00000001c0)) timer_delete(0x0) 19:41:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000000)) 19:41:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180)) setgroups(0x0, &(0x7f0000000240)) 19:41:53 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000100)) 19:41:53 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) timer_create(0x0, &(0x7f0000000180), &(0x7f00000001c0)) timer_delete(0x0) 19:41:53 executing program 0: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 19:41:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket(0x0, 0x0, 0x0) mlockall(0x0) 19:41:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) process_vm_writev(0x0, &(0x7f0000000080), 0x0, &(0x7f0000000380), 0x0, 0x0) 19:41:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180)) setgroups(0x0, &(0x7f0000000240)) 19:41:53 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280), 0x0) 19:41:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000000)) 19:41:53 executing program 0: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 19:41:53 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) timer_create(0x0, &(0x7f0000000180), &(0x7f00000001c0)) timer_delete(0x0) [ 774.543137] kauditd_printk_skb: 7 callbacks suppressed [ 774.543160] audit: type=1326 audit(1529696513.541:1688): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16511 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:41:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket(0x0, 0x0, 0x0) mlockall(0x0) 19:41:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) setgroups(0x0, &(0x7f0000000240)) 19:41:53 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 19:41:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) process_vm_writev(0x0, &(0x7f0000000080), 0x0, &(0x7f0000000380), 0x0, 0x0) 19:41:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000000)) 19:41:53 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) timer_create(0x0, &(0x7f0000000180), &(0x7f00000001c0)) timer_delete(0x0) 19:41:54 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000100)) 19:41:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket(0x0, 0x0, 0x0) mlockall(0x0) 19:41:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) setgroups(0x0, &(0x7f0000000240)) 19:41:54 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 19:41:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000000)) 19:41:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) process_vm_writev(0x0, &(0x7f0000000080), 0x0, &(0x7f0000000380), 0x0, 0x0) [ 775.263444] audit: type=1326 audit(1529696514.262:1689): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16557 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:41:54 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280), 0x0) 19:41:54 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) timer_create(0x0, &(0x7f0000000180), &(0x7f00000001c0)) timer_delete(0x0) 19:41:54 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 19:41:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000000)) 19:41:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket(0x0, 0x0, 0x0) mlockall(0x0) 19:41:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) process_vm_writev(0x0, &(0x7f0000000080), 0x0, &(0x7f0000000380), 0x0, 0x0) 19:41:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) setgroups(0x0, &(0x7f0000000240)) [ 775.515475] audit: type=1326 audit(1529696514.514:1690): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16578 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:41:54 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 19:41:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) process_vm_writev(0x0, &(0x7f0000000080), 0x0, &(0x7f0000000380), 0x0, 0x0) 19:41:54 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) timer_create(0x0, &(0x7f0000000180), &(0x7f00000001c0)) timer_delete(0x0) 19:41:55 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) timer_create(0x0, &(0x7f0000000180), &(0x7f00000001c0)) timer_delete(0x0) 19:41:55 executing program 6: getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180)) setgroups(0x0, &(0x7f0000000240)) 19:41:55 executing program 5: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000000)) 19:41:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) mlockall(0x0) 19:41:55 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 19:41:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) process_vm_writev(0x0, &(0x7f0000000080), 0x0, &(0x7f0000000380), 0x0, 0x0) 19:41:55 executing program 6: getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180)) setgroups(0x0, &(0x7f0000000240)) 19:41:55 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) connect(0xffffffffffffffff, &(0x7f0000000000)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'poly1305\x00'}, 0x80) 19:41:55 executing program 5: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000000)) 19:41:55 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 19:41:55 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) timer_create(0x0, &(0x7f0000000180), &(0x7f00000001c0)) timer_delete(0x0) 19:41:55 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000000)) 19:41:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) process_vm_writev(0x0, &(0x7f0000000080), 0x0, &(0x7f0000000380), 0x0, 0x0) 19:41:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) mlockall(0x0) [ 776.477069] audit: type=1326 audit(1529696515.475:1691): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16620 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:41:55 executing program 5: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000000)) 19:41:55 executing program 6: getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180)) setgroups(0x0, &(0x7f0000000240)) 19:41:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) mlockall(0x0) 19:41:55 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 19:41:55 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) process_vm_writev(0x0, &(0x7f0000000080), 0x0, &(0x7f0000000380), 0x0, 0x0) 19:41:55 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000040)) 19:41:55 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000000)) 19:41:55 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180)) setgroups(0x0, &(0x7f0000000240)) 19:41:55 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, &(0x7f0000000200)={{}, 0x0, 0x0, 'id1\x00', 'timer0\x00'}) 19:41:55 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) process_vm_writev(0x0, &(0x7f0000000080), 0x0, &(0x7f0000000380), 0x0, 0x0) 19:41:55 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 19:41:55 executing program 2: socket(0x0, 0x0, 0x0) mlockall(0x0) 19:41:56 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) timer_create(0x0, &(0x7f0000000180), &(0x7f00000001c0)) timer_delete(0x0) 19:41:56 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000000)) 19:41:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000040)) 19:41:56 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) process_vm_writev(0x0, &(0x7f0000000080), 0x0, &(0x7f0000000380), 0x0, 0x0) 19:41:56 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180)) setgroups(0x0, &(0x7f0000000240)) 19:41:56 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 19:41:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, &(0x7f0000000200)={{}, 0x0, 0x0, 'id1\x00', 'timer0\x00'}) 19:41:56 executing program 2: socket(0x0, 0x0, 0x0) mlockall(0x0) [ 777.424448] audit: type=1326 audit(1529696516.423:1692): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16683 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:41:56 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 19:41:56 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000000)) 19:41:56 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) process_vm_writev(0x0, &(0x7f0000000080), 0x0, &(0x7f0000000380), 0x0, 0x0) 19:41:56 executing program 2: socket(0x0, 0x0, 0x0) mlockall(0x0) 19:41:56 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180)) setgroups(0x0, &(0x7f0000000240)) 19:41:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, &(0x7f0000000200)={{}, 0x0, 0x0, 'id1\x00', 'timer0\x00'}) [ 777.630844] audit: type=1326 audit(1529696516.629:1693): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16705 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:41:56 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) process_vm_writev(0x0, &(0x7f0000000080), 0x0, &(0x7f0000000380), 0x0, 0x0) 19:41:56 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000000)) 19:41:57 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) process_vm_writev(0x0, &(0x7f0000000080), 0x0, &(0x7f0000000380), 0x0, 0x0) 19:41:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180)) setgroups(0x0, &(0x7f0000000240)) 19:41:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000040)) 19:41:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000000)) 19:41:57 executing program 2: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket(0x0, 0x0, 0x0) mlockall(0x0) 19:41:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, &(0x7f0000000200)={{}, 0x0, 0x0, 'id1\x00', 'timer0\x00'}) 19:41:57 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) timer_create(0x0, &(0x7f0000000180), &(0x7f00000001c0)) timer_delete(0x0) [ 778.376124] audit: type=1326 audit(1529696517.374:1694): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16745 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:41:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180)) setgroups(0x0, &(0x7f0000000240)) 19:41:57 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 19:41:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) process_vm_writev(0x0, &(0x7f0000000080), 0x0, &(0x7f0000000380), 0x0, 0x0) 19:41:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000000)) 19:41:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, &(0x7f0000000200)={{}, 0x0, 0x0, 'id1\x00', 'timer0\x00'}) 19:41:57 executing program 2: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket(0x0, 0x0, 0x0) mlockall(0x0) 19:41:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180)) setgroups(0x0, &(0x7f0000000240)) 19:41:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000040)) [ 778.683339] audit: type=1326 audit(1529696517.681:1695): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16771 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:41:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180)) setgroups(0x0, &(0x7f0000000240)) 19:41:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000000)) 19:41:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000000)) 19:41:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, &(0x7f0000000200)={{}, 0x0, 0x0, 'id1\x00', 'timer0\x00'}) 19:41:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) process_vm_writev(0x0, &(0x7f0000000080), 0x0, &(0x7f0000000380), 0x0, 0x0) 19:41:58 executing program 2: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket(0x0, 0x0, 0x0) mlockall(0x0) 19:41:58 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000040)) 19:41:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180)) setgroups(0x0, &(0x7f0000000240)) 19:41:58 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000340)) 19:41:58 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 19:41:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000000)) 19:41:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) process_vm_writev(0x0, &(0x7f0000000080), 0x0, &(0x7f0000000380), 0x0, 0x0) 19:41:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180)) setgroups(0x0, &(0x7f0000000240)) 19:41:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket(0x0, 0x0, 0x0) mlockall(0x0) 19:41:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, &(0x7f0000000200)={{}, 0x0, 0x0, 'id1\x00', 'timer0\x00'}) 19:41:58 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000040)) 19:41:58 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000340)) [ 779.634889] audit: type=1326 audit(1529696518.633:1696): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16815 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:41:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) process_vm_writev(0x0, &(0x7f0000000080), 0x0, &(0x7f0000000380), 0x0, 0x0) 19:41:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180)) setgroups(0x0, &(0x7f0000000240)) 19:41:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000000)) 19:41:58 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000040)) 19:41:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket(0x0, 0x0, 0x0) mlockall(0x0) 19:41:58 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000340)) [ 779.826754] audit: type=1326 audit(1529696518.825:1697): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16833 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:41:58 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, &(0x7f0000000200)={{}, 0x0, 0x0, 'id1\x00', 'timer0\x00'}) [ 779.912789] audit: type=1326 audit(1529696518.850:1698): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16837 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:41:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) process_vm_writev(0x0, &(0x7f0000000080), 0x0, &(0x7f0000000380), 0x0, 0x0) 19:41:59 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000340)) 19:41:59 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, &(0x7f0000000200)={{}, 0x0, 0x0, 'id1\x00', 'timer0\x00'}) 19:41:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) process_vm_writev(0x0, &(0x7f0000000080), 0x0, &(0x7f0000000380), 0x0, 0x0) 19:41:59 executing program 4: socket$inet(0x2, 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000040)) 19:41:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket(0x0, 0x0, 0x0) mlockall(0x0) 19:41:59 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000340)={@empty, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, 'sW;', 0x44, 0x0, 0x0, @empty, @dev={0xfe, 0x80}, {[], @gre={{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd}, {0x8, 0x88be, 0x0, {{0x0, 0x1}, 0x1}}, {0x8, 0x22eb, 0x0, {{0x0, 0x2}, 0x2}}, {0x8, 0x6558}}}}}}}, &(0x7f0000000900)) 19:41:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) process_vm_writev(0x0, &(0x7f0000000080), 0x0, &(0x7f0000000380), 0x0, 0x0) 19:41:59 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, &(0x7f0000000200)={{}, 0x0, 0x0, 'id1\x00', 'timer0\x00'}) 19:41:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) socket(0x0, 0x0, 0x0) mlockall(0x0) [ 780.742345] audit: type=1326 audit(1529696519.741:1699): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16882 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:41:59 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180)) setgroups(0x0, &(0x7f0000000240)) 19:41:59 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000000)) 19:41:59 executing program 4: socket$inet(0x2, 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000040)) 19:41:59 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000340)) 19:41:59 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000340)={@empty, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, 'sW;', 0x44, 0x0, 0x0, @empty, @dev={0xfe, 0x80}, {[], @gre={{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd}, {0x8, 0x88be, 0x0, {{0x0, 0x1}, 0x1}}, {0x8, 0x22eb, 0x0, {{0x0, 0x2}, 0x2}}, {0x8, 0x6558}}}}}}}, &(0x7f0000000900)) 19:41:59 executing program 1: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, &(0x7f0000000200)={{}, 0x0, 0x0, 'id1\x00', 'timer0\x00'}) [ 780.891204] audit: type=1326 audit(1529696519.890:1700): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16897 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) socket(0x0, 0x0, 0x0) mlockall(0x0) [ 780.983389] audit: type=1326 audit(1529696519.925:1701): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16898 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:00 executing program 4: socket$inet(0x2, 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000040)) 19:42:00 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000340)) 19:42:00 executing program 1: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, &(0x7f0000000200)={{}, 0x0, 0x0, 'id1\x00', 'timer0\x00'}) 19:42:00 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000340)={@empty, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, 'sW;', 0x44, 0x0, 0x0, @empty, @dev={0xfe, 0x80}, {[], @gre={{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd}, {0x8, 0x88be, 0x0, {{0x0, 0x1}, 0x1}}, {0x8, 0x22eb, 0x0, {{0x0, 0x2}, 0x2}}, {0x8, 0x6558}}}}}}}, &(0x7f0000000900)) 19:42:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) socket(0x0, 0x0, 0x0) mlockall(0x0) 19:42:00 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000340)) 19:42:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) process_vm_writev(0x0, &(0x7f0000000080), 0x0, &(0x7f0000000380), 0x0, 0x0) 19:42:00 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000340)={@empty, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, 'sW;', 0x44, 0x0, 0x0, @empty, @dev={0xfe, 0x80}, {[], @gre={{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd}, {0x8, 0x88be, 0x0, {{0x0, 0x1}, 0x1}}, {0x8, 0x22eb, 0x0, {{0x0, 0x2}, 0x2}}, {0x8, 0x6558}}}}}}}, &(0x7f0000000900)) 19:42:00 executing program 1: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, &(0x7f0000000200)={{}, 0x0, 0x0, 'id1\x00', 'timer0\x00'}) [ 781.662290] audit: type=1326 audit(1529696520.660:1702): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16945 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:00 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180)) setgroups(0x0, &(0x7f0000000240)) 19:42:00 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000040)) 19:42:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket(0x0, 0x0, 0x0) mlockall(0x0) 19:42:00 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000340)) 19:42:00 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, &(0x7f0000000200)={{}, 0x0, 0x0, 'id1\x00', 'timer0\x00'}) 19:42:00 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5023c}]}) syz_emit_ethernet(0x7a, &(0x7f0000000340)={@empty, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, 'sW;', 0x44, 0x0, 0x0, @empty, @dev={0xfe, 0x80}, {[], @gre={{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd}, {0x8, 0x88be, 0x0, {{0x0, 0x1}, 0x1}}, {0x8, 0x22eb, 0x0, {{0x0, 0x2}, 0x2}}, {0x8, 0x6558}}}}}}}, &(0x7f0000000900)) 19:42:00 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000000)) [ 781.846595] audit: type=1326 audit(1529696520.845:1703): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16952 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 781.904641] audit: type=1326 audit(1529696520.890:1704): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16964 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:00 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000340)) 19:42:00 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, &(0x7f0000000200)={{}, 0x0, 0x0, 'id1\x00', 'timer0\x00'}) 19:42:00 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000040)) 19:42:00 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5023c}]}) syz_emit_ethernet(0x7a, &(0x7f0000000340)={@empty, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, 'sW;', 0x44, 0x0, 0x0, @empty, @dev={0xfe, 0x80}, {[], @gre={{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd}, {0x8, 0x88be, 0x0, {{0x0, 0x1}, 0x1}}, {0x8, 0x22eb, 0x0, {{0x0, 0x2}, 0x2}}, {0x8, 0x6558}}}}}}}, &(0x7f0000000900)) [ 781.959718] audit: type=1326 audit(1529696520.924:1705): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16966 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:01 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000340)) 19:42:01 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, &(0x7f0000000200)={{}, 0x0, 0x0, 'id1\x00', 'timer0\x00'}) 19:42:01 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000040)) 19:42:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) process_vm_writev(0x0, &(0x7f0000000080), 0x0, &(0x7f0000000380), 0x0, 0x0) 19:42:01 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5023c}]}) syz_emit_ethernet(0x7a, &(0x7f0000000340)={@empty, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, 'sW;', 0x44, 0x0, 0x0, @empty, @dev={0xfe, 0x80}, {[], @gre={{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd}, {0x8, 0x88be, 0x0, {{0x0, 0x1}, 0x1}}, {0x8, 0x22eb, 0x0, {{0x0, 0x2}, 0x2}}, {0x8, 0x6558}}}}}}}, &(0x7f0000000900)) 19:42:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000180), &(0x7f00000001c0)=0x8) 19:42:01 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000340)) 19:42:01 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, &(0x7f0000000200)={{}, 0x0, 0x0, 'id1\x00', 'timer0\x00'}) 19:42:01 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000040)) 19:42:01 executing program 0: get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000340)={@empty, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, 'sW;', 0x44, 0x0, 0x0, @empty, @dev={0xfe, 0x80}, {[], @gre={{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd}, {0x8, 0x88be, 0x0, {{0x0, 0x1}, 0x1}}, {0x8, 0x22eb, 0x0, {{0x0, 0x2}, 0x2}}, {0x8, 0x6558}}}}}}}, &(0x7f0000000900)) 19:42:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket(0x0, 0x0, 0x0) mlockall(0x0) 19:42:01 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f00000000c0)) 19:42:01 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, &(0x7f0000000200)={{}, 0x0, 0x0, 'id1\x00', 'timer0\x00'}) 19:42:01 executing program 0: get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000340)={@empty, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, 'sW;', 0x44, 0x0, 0x0, @empty, @dev={0xfe, 0x80}, {[], @gre={{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd}, {0x8, 0x88be, 0x0, {{0x0, 0x1}, 0x1}}, {0x8, 0x22eb, 0x0, {{0x0, 0x2}, 0x2}}, {0x8, 0x6558}}}}}}}, &(0x7f0000000900)) 19:42:01 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000340)) 19:42:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000040)) 19:42:02 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000340)) 19:42:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000180), &(0x7f00000001c0)=0x8) 19:42:02 executing program 0: get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000340)={@empty, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, 'sW;', 0x44, 0x0, 0x0, @empty, @dev={0xfe, 0x80}, {[], @gre={{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd}, {0x8, 0x88be, 0x0, {{0x0, 0x1}, 0x1}}, {0x8, 0x22eb, 0x0, {{0x0, 0x2}, 0x2}}, {0x8, 0x6558}}}}}}}, &(0x7f0000000900)) 19:42:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000180), &(0x7f00000001c0)=0x8) 19:42:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f00000000c0)) 19:42:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, &(0x7f0000000200)={{}, 0x0, 0x0, 'id1\x00', 'timer0\x00'}) 19:42:02 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000340)={@empty, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, 'sW;', 0x44, 0x0, 0x0, @empty, @dev={0xfe, 0x80}, {[], @gre={{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd}, {0x8, 0x88be, 0x0, {{0x0, 0x1}, 0x1}}, {0x8, 0x22eb, 0x0, {{0x0, 0x2}, 0x2}}, {0x8, 0x6558}}}}}}}, &(0x7f0000000900)) 19:42:02 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f00000002c0)) 19:42:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000040)) 19:42:02 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000340)) 19:42:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket(0x0, 0x0, 0x0) mlockall(0x0) 19:42:02 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000340)) 19:42:02 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000340)={@empty, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, 'sW;', 0x44, 0x0, 0x0, @empty, @dev={0xfe, 0x80}, {[], @gre={{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd}, {0x8, 0x88be, 0x0, {{0x0, 0x1}, 0x1}}, {0x8, 0x22eb, 0x0, {{0x0, 0x2}, 0x2}}, {0x8, 0x6558}}}}}}}, &(0x7f0000000900)) 19:42:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, &(0x7f0000000200)={{}, 0x0, 0x0, 'id1\x00', 'timer0\x00'}) 19:42:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f00000000c0)) 19:42:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000180), &(0x7f00000001c0)=0x8) 19:42:02 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f00000002c0)) 19:42:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000040)) 19:42:02 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f00000002c0)) 19:42:02 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000340)) 19:42:02 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000340)={@empty, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, 'sW;', 0x44, 0x0, 0x0, @empty, @dev={0xfe, 0x80}, {[], @gre={{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd}, {0x8, 0x88be, 0x0, {{0x0, 0x1}, 0x1}}, {0x8, 0x22eb, 0x0, {{0x0, 0x2}, 0x2}}, {0x8, 0x6558}}}}}}}, &(0x7f0000000900)) 19:42:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000180), &(0x7f00000001c0)=0x8) 19:42:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f00000000c0)) 19:42:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000040)) 19:42:03 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f00000002c0)) 19:42:03 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000340)={@empty, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, 'sW;', 0x44, 0x0, 0x0, @empty, @dev={0xfe, 0x80}, {[], @gre={{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd}, {0x8, 0x88be, 0x0, {{0x0, 0x1}, 0x1}}, {0x8, 0x22eb, 0x0, {{0x0, 0x2}, 0x2}}, {0x8, 0x6558}}}}}}}, &(0x7f0000000900)) 19:42:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, &(0x7f0000000200)={{}, 0x0, 0x0, 'id1\x00', 'timer0\x00'}) 19:42:03 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000340)) 19:42:03 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000180), &(0x7f00000001c0)=0x8) 19:42:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000040)) 19:42:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f00000000c0)) 19:42:03 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000340)={@empty, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, 'sW;', 0x44, 0x0, 0x0, @empty, @dev={0xfe, 0x80}, {[], @gre={{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd}, {0x8, 0x88be, 0x0, {{0x0, 0x1}, 0x1}}, {0x8, 0x22eb, 0x0, {{0x0, 0x2}, 0x2}}, {0x8, 0x6558}}}}}}}, &(0x7f0000000900)) 19:42:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000100)) 19:42:03 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f00000002c0)) [ 784.804806] kauditd_printk_skb: 4 callbacks suppressed [ 784.804828] audit: type=1326 audit(1529696523.803:1710): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17140 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:03 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000340)={@empty, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, 'sW;', 0x44, 0x0, 0x0, @empty, @dev={0xfe, 0x80}, {[], @gre={{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd}, {0x8, 0x88be, 0x0, {{0x0, 0x1}, 0x1}}, {0x8, 0x22eb, 0x0, {{0x0, 0x2}, 0x2}}, {0x8, 0x6558}}}}}}}, &(0x7f0000000900)) 19:42:03 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000340)) 19:42:03 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f00000002c0)) 19:42:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000040)) 19:42:04 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50238}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000100)) 19:42:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f00000000c0)) 19:42:04 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000180), &(0x7f00000001c0)=0x8) [ 785.069548] audit: type=1326 audit(1529696524.068:1711): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17167 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:04 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000340)) 19:42:04 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, &(0x7f0000000200)={{}, 0x0, 0x0, 'id1\x00', 'timer0\x00'}) 19:42:04 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000340)={@empty, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, 'sW;', 0x44, 0x0, 0x0, @empty, @dev={0xfe, 0x80}, {[], @gre={{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd}, {0x8, 0x88be, 0x0, {{0x0, 0x1}, 0x1}}, {0x8, 0x22eb, 0x0, {{0x0, 0x2}, 0x2}}, {0x8, 0x6558}}}}}}}, &(0x7f0000000900)) 19:42:04 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f00000002c0)) 19:42:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f00000000c0)) 19:42:04 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000340)) 19:42:04 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50238}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000100)) 19:42:04 executing program 5: openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000180), &(0x7f00000001c0)=0x8) [ 785.713632] audit: type=1326 audit(1529696524.712:1712): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17190 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 785.778217] audit: type=1326 audit(1529696524.772:1713): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17193 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:04 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000340)={@empty, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, 'sW;', 0x44, 0x0, 0x0, @empty, @dev={0xfe, 0x80}, {[], @gre={{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd}, {0x8, 0x88be, 0x0, {{0x0, 0x1}, 0x1}}, {0x8, 0x22eb, 0x0, {{0x0, 0x2}, 0x2}}, {0x8, 0x6558}}}}}}}, &(0x7f0000000900)) 19:42:04 executing program 5: openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000180), &(0x7f00000001c0)=0x8) 19:42:04 executing program 6: syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f00000000c0)) 19:42:04 executing program 3: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f00000002c0)) 19:42:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000040)) 19:42:05 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50238}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000100)) 19:42:05 executing program 6: syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f00000000c0)) 19:42:05 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000340)={@empty, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, 'sW;', 0x44, 0x0, 0x0, @empty, @dev={0xfe, 0x80}, {[], @gre={{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd}, {0x8, 0x88be, 0x0, {{0x0, 0x1}, 0x1}}, {0x8, 0x22eb, 0x0, {{0x0, 0x2}, 0x2}}, {0x8, 0x6558}}}}}}}, &(0x7f0000000900)) 19:42:05 executing program 5: openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000180), &(0x7f00000001c0)=0x8) [ 786.071543] audit: type=1326 audit(1529696525.070:1714): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17222 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:05 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000180), &(0x7f00000001c0)=0x8) 19:42:05 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000340)={@empty, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, 'sW;', 0x44, 0x0, 0x0, @empty, @dev={0xfe, 0x80}, {[], @gre={{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd}, {0x8, 0x88be, 0x0, {{0x0, 0x1}, 0x1}}, {0x8, 0x22eb, 0x0, {{0x0, 0x2}, 0x2}}, {0x8, 0x6558}}}}}}}, &(0x7f0000000900)) 19:42:05 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50238}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000100)) 19:42:05 executing program 6: syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f00000000c0)) 19:42:05 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000340)) 19:42:05 executing program 3: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f00000002c0)) 19:42:05 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000140)) [ 786.650800] audit: type=1326 audit(1529696525.649:1715): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17240 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:05 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f00000000c0)) 19:42:05 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000180), &(0x7f00000001c0)=0x8) [ 786.796352] audit: type=1326 audit(1529696525.794:1716): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17255 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:05 executing program 3: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f00000002c0)) 19:42:05 executing program 2: r0 = socket(0x1e, 0x2, 0x0) bind(r0, &(0x7f0000000140)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) 19:42:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000040)) 19:42:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000140)) 19:42:06 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f00000000c0)) 19:42:06 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000180), &(0x7f00000001c0)=0x8) 19:42:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) [ 787.078399] audit: type=1326 audit(1529696526.077:1717): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17277 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:06 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f00000000c0)) 19:42:06 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f00000002c0)) 19:42:06 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000340)={@empty, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, 'sW;', 0x44, 0x0, 0x0, @empty, @dev={0xfe, 0x80}, {[], @gre={{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd}, {0x8, 0x88be, 0x0, {{0x0, 0x1}, 0x1}}, {0x8, 0x22eb, 0x0, {{0x0, 0x2}, 0x2}}, {0x8, 0x6558}}}}}}}, &(0x7f0000000900)) 19:42:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000140)) [ 787.606138] audit: type=1326 audit(1529696526.604:1718): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17299 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:06 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000340)) 19:42:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000180), &(0x7f00000001c0)=0x8) 19:42:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000400)) 19:42:06 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f00000000c0)) 19:42:06 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f00000002c0)) 19:42:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000140)) 19:42:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000180), &(0x7f00000001c0)=0x8) [ 787.789786] audit: type=1326 audit(1529696526.788:1719): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17315 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:06 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f00000000c0)) 19:42:06 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f00000002c0)) 19:42:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000340)) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000080)={'bcsh0\x00'}) 19:42:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000140)) 19:42:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000180), &(0x7f00000001c0)=0x8) 19:42:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000400)) 19:42:07 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f00000002c0)) 19:42:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000400)) 19:42:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f00000000c0)) 19:42:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000400)) 19:42:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000340)) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000080)={'bcsh0\x00'}) 19:42:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000140)) 19:42:07 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000340)={@empty, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, 'sW;', 0x44, 0x0, 0x0, @empty, @dev={0xfe, 0x80}, {[], @gre={{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd}, {0x8, 0x88be, 0x0, {{0x0, 0x1}, 0x1}}, {0x8, 0x22eb, 0x0, {{0x0, 0x2}, 0x2}}, {0x8, 0x6558}}}}}}}, &(0x7f0000000900)) 19:42:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000180), &(0x7f00000001c0)=0x8) 19:42:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501cd}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f00000000c0)) 19:42:07 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) capget(&(0x7f0000000100), &(0x7f0000000180)) 19:42:07 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f00000002c0)) 19:42:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501cd}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f00000000c0)) 19:42:07 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f00000002c0)) 19:42:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000180), &(0x7f00000001c0)=0x8) 19:42:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000140)) 19:42:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000340)) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000080)={'bcsh0\x00'}) 19:42:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000400)) 19:42:08 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) capget(&(0x7f0000000100), &(0x7f0000000180)) 19:42:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501cd}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f00000000c0)) 19:42:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000180), &(0x7f00000001c0)=0x8) 19:42:08 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f00000002c0)) 19:42:08 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) capget(&(0x7f0000000100), &(0x7f0000000180)) 19:42:08 executing program 1: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000140)) 19:42:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000400)) 19:42:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000340)) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000080)={'bcsh0\x00'}) 19:42:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f00000000c0)) 19:42:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000180), &(0x7f00000001c0)=0x8) 19:42:08 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f00000002c0)) 19:42:08 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000280)=0x1c) 19:42:08 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f00000002c0)) 19:42:08 executing program 1: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000140)) 19:42:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000080)={'bcsh0\x00'}) 19:42:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000400)) 19:42:08 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) capget(&(0x7f0000000100), &(0x7f0000000180)) 19:42:08 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f00000002c0)) 19:42:08 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000280)=0x1c) 19:42:09 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000080)={'bcsh0\x00'}) 19:42:09 executing program 1: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000140)) [ 790.009645] kauditd_printk_skb: 3 callbacks suppressed [ 790.009665] audit: type=1326 audit(1529696529.008:1723): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17447 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:09 executing program 2: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000400)) 19:42:09 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) capget(&(0x7f0000000100), &(0x7f0000000180)) 19:42:09 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000280)=0x1c) 19:42:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f00000000c0)) 19:42:09 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000080)={'bcsh0\x00'}) 19:42:09 executing program 1: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000140)) 19:42:09 executing program 2: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000400)) 19:42:09 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) capget(&(0x7f0000000100), &(0x7f0000000180)) 19:42:09 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000280)=0x1c) 19:42:09 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000180), &(0x7f00000001c0)=0x8) [ 790.650089] audit: type=1326 audit(1529696529.648:1725): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17476 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 790.669908] audit: type=1326 audit(1529696529.648:1724): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17484 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:09 executing program 2: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000400)) 19:42:09 executing program 1: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000140)) 19:42:09 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f00000002c0)) 19:42:09 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000280)=0x1c) 19:42:09 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) capget(&(0x7f0000000100), &(0x7f0000000180)) 19:42:09 executing program 4: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000340)) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000080)={'bcsh0\x00'}) 19:42:09 executing program 1: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000140)) 19:42:09 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000400)) [ 791.026080] audit: type=1326 audit(1529696530.024:1726): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17501 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:10 executing program 4: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000340)) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000080)={'bcsh0\x00'}) 19:42:10 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f00000000c0)) 19:42:10 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000400)) 19:42:10 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000280)=0x1c) 19:42:10 executing program 7: get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) capget(&(0x7f0000000100), &(0x7f0000000180)) 19:42:10 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000140)) 19:42:10 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000180), &(0x7f00000001c0)=0x8) 19:42:10 executing program 4: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000340)) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000080)={'bcsh0\x00'}) [ 791.677506] audit: type=1326 audit(1529696530.676:1727): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17537 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:10 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000400)) 19:42:10 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000340)) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000080)={'bcsh0\x00'}) [ 791.770381] audit: type=1326 audit(1529696530.721:1728): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17538 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:10 executing program 7: get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) capget(&(0x7f0000000100), &(0x7f0000000180)) 19:42:10 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000340)) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000080)={'bcsh0\x00'}) 19:42:10 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000140)) 19:42:10 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000280)=0x1c) 19:42:10 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f00000002c0)) 19:42:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000400)) [ 792.029412] audit: type=1326 audit(1529696531.028:1729): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17562 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000140)) 19:42:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000140)) 19:42:11 executing program 7: get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) capget(&(0x7f0000000100), &(0x7f0000000180)) 19:42:11 executing program 0: socket$inet6(0xa, 0x0, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000280)=0x1c) 19:42:11 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000340)) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000080)={'bcsh0\x00'}) 19:42:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000400)) 19:42:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050098}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000100), 0x0) 19:42:11 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f7}]}) prctl$setfpexc(0xc, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0) 19:42:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000340)) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000080)={'bcsh0\x00'}) 19:42:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000140)) 19:42:11 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) capget(&(0x7f0000000100), &(0x7f0000000180)) 19:42:11 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f7}]}) prctl$setfpexc(0xc, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0) 19:42:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000400)) 19:42:11 executing program 0: socket$inet6(0xa, 0x0, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000280)=0x1c) 19:42:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000140)) 19:42:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000340)) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000080)={'bcsh0\x00'}) 19:42:11 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) capget(&(0x7f0000000100), &(0x7f0000000180)) 19:42:11 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) recvmsg(0xffffffffffffff9c, &(0x7f00000005c0)={&(0x7f0000000380)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @rand_addr}}}, 0x80, &(0x7f0000000500), 0x0, &(0x7f0000000540)=""/115, 0x73}, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f0000000100)=0x4) 19:42:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050098}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000100), 0x0) 19:42:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000140)) 19:42:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050098}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000100), 0x0) 19:42:12 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) capget(&(0x7f0000000100), &(0x7f0000000180)) 19:42:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000340)) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000080)={'bcsh0\x00'}) 19:42:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000400)) [ 793.193392] audit: type=1326 audit(1529696532.192:1730): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17635 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:12 executing program 0: socket$inet6(0xa, 0x0, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000280)=0x1c) 19:42:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f7}]}) prctl$setfpexc(0xc, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0) 19:42:12 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) recvmsg(0xffffffffffffff9c, &(0x7f00000005c0)={&(0x7f0000000380)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @rand_addr}}}, 0x80, &(0x7f0000000500), 0x0, &(0x7f0000000540)=""/115, 0x73}, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f0000000100)=0x4) 19:42:12 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) capget(&(0x7f0000000100), &(0x7f0000000180)) 19:42:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000400)) 19:42:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050098}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000100), 0x0) 19:42:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000340)) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000080)={'bcsh0\x00'}) 19:42:12 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) recvmsg(0xffffffffffffff9c, &(0x7f00000005c0)={&(0x7f0000000380)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @rand_addr}}}, 0x80, &(0x7f0000000500), 0x0, &(0x7f0000000540)=""/115, 0x73}, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f0000000100)=0x4) 19:42:12 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000280)=0x1c) 19:42:12 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) capget(&(0x7f0000000100), &(0x7f0000000180)) 19:42:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000400)) 19:42:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000140)) 19:42:13 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f7}]}) prctl$setfpexc(0xc, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0) 19:42:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050098}]}) write(0xffffffffffffffff, &(0x7f0000000100), 0x0) 19:42:13 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000340)) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000080)={'bcsh0\x00'}) 19:42:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000400)) 19:42:13 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) recvmsg(0xffffffffffffff9c, &(0x7f00000005c0)={&(0x7f0000000380)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @rand_addr}}}, 0x80, &(0x7f0000000500), 0x0, &(0x7f0000000540)=""/115, 0x73}, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f0000000100)=0x4) 19:42:13 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) capget(&(0x7f0000000100), &(0x7f0000000180)) 19:42:13 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000280)=0x1c) [ 794.143636] audit: type=1326 audit(1529696533.142:1731): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17700 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:13 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) capget(&(0x7f0000000100), &(0x7f0000000180)) 19:42:13 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000340)) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000080)={'bcsh0\x00'}) [ 794.221165] audit: type=1326 audit(1529696533.178:1732): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17709 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050098}]}) write(0xffffffffffffffff, &(0x7f0000000100), 0x0) 19:42:13 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f7}]}) mkdirat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0) 19:42:13 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f0000000100)=0x4) 19:42:13 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000280)=0x1c) 19:42:13 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000340)) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000080)={'bcsh0\x00'}) 19:42:13 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) capget(&(0x7f0000000100), &(0x7f0000000180)) 19:42:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000140)) 19:42:14 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f7}]}) mkdirat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0) 19:42:14 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050098}]}) write(0xffffffffffffffff, &(0x7f0000000100), 0x0) 19:42:14 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f0000000100)=0x4) 19:42:14 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) capget(&(0x7f0000000100), &(0x7f0000000180)) 19:42:14 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket$inet6(0xa, 0x0, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000280)=0x1c) 19:42:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000400)) [ 795.129683] kauditd_printk_skb: 1 callbacks suppressed [ 795.129704] audit: type=1326 audit(1529696534.128:1734): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17750 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:14 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) capget(&(0x7f0000000100), &(0x7f0000000180)) [ 795.183649] audit: type=1326 audit(1529696534.161:1735): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17755 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:14 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f7}]}) mkdirat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0) 19:42:14 executing program 6: openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000100), 0x0) 19:42:14 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f0000000100)=0x4) 19:42:14 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket$inet6(0xa, 0x0, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000280)=0x1c) [ 795.320371] audit: type=1326 audit(1529696534.265:1736): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17764 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:14 executing program 6: openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000100), 0x0) 19:42:14 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000340)) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000080)={'bcsh0\x00'}) 19:42:14 executing program 3: recvmsg(0xffffffffffffff9c, &(0x7f00000005c0)={&(0x7f0000000380)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @rand_addr}}}, 0x80, &(0x7f0000000500), 0x0, &(0x7f0000000540)=""/115, 0x73}, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f0000000100)=0x4) 19:42:14 executing program 5: prctl$setfpexc(0xc, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0) [ 795.539899] audit: type=1326 audit(1529696534.538:1737): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17785 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:15 executing program 6: openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000100), 0x0) 19:42:15 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket$inet6(0xa, 0x0, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000280)=0x1c) 19:42:15 executing program 3: recvmsg(0xffffffffffffff9c, &(0x7f00000005c0)={&(0x7f0000000380)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @rand_addr}}}, 0x80, &(0x7f0000000500), 0x0, &(0x7f0000000540)=""/115, 0x73}, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f0000000100)=0x4) 19:42:15 executing program 5: prctl$setfpexc(0xc, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0) 19:42:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000400)) 19:42:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f7}]}) syz_open_dev$mice(&(0x7f0000000580)='/dev/input/mice\x00', 0x0, 0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000100)) 19:42:15 executing program 3: recvmsg(0xffffffffffffff9c, &(0x7f00000005c0)={&(0x7f0000000380)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @rand_addr}}}, 0x80, &(0x7f0000000500), 0x0, &(0x7f0000000540)=""/115, 0x73}, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f0000000100)=0x4) [ 796.127465] audit: type=1326 audit(1529696535.126:1738): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17811 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:15 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) capget(&(0x7f0000000100), &(0x7f0000000180)) 19:42:15 executing program 5: prctl$setfpexc(0xc, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0) 19:42:15 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050098}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000100), 0x0) 19:42:15 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000280)=0x1c) 19:42:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f7}]}) syz_open_dev$mice(&(0x7f0000000580)='/dev/input/mice\x00', 0x0, 0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000100)) 19:42:15 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) recvmsg(0xffffffffffffff9c, &(0x7f00000005c0)={&(0x7f0000000380)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @rand_addr}}}, 0x80, &(0x7f0000000500), 0x0, &(0x7f0000000540)=""/115, 0x73}, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f0000000100)=0x4) [ 796.367563] audit: type=1326 audit(1529696535.366:1739): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17830 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:15 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000340)) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000080)={'bcsh0\x00'}) 19:42:15 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f7}]}) prctl$setfpexc(0xc, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0) 19:42:15 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050098}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000100), 0x0) 19:42:15 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) recvmsg(0xffffffffffffff9c, &(0x7f00000005c0)={&(0x7f0000000380)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @rand_addr}}}, 0x80, &(0x7f0000000500), 0x0, &(0x7f0000000540)=""/115, 0x73}, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f0000000100)=0x4) 19:42:15 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000280)=0x1c) 19:42:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f7}]}) syz_open_dev$mice(&(0x7f0000000580)='/dev/input/mice\x00', 0x0, 0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000100)) [ 796.613489] audit: type=1326 audit(1529696535.612:1740): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17848 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:15 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) recvmsg(0xffffffffffffff9c, &(0x7f00000005c0)={&(0x7f0000000380)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @rand_addr}}}, 0x80, &(0x7f0000000500), 0x0, &(0x7f0000000540)=""/115, 0x73}, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f0000000100)=0x4) 19:42:16 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f7}]}) prctl$setfpexc(0xc, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0) 19:42:16 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050098}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000100), 0x0) 19:42:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f7}]}) syz_open_dev$mice(&(0x7f0000000580)='/dev/input/mice\x00', 0x0, 0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000100)) 19:42:16 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) capget(&(0x7f0000000100), &(0x7f0000000180)) 19:42:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) recvmsg(0xffffffffffffff9c, &(0x7f00000005c0)={&(0x7f0000000380)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @rand_addr}}}, 0x80, &(0x7f0000000500), 0x0, &(0x7f0000000540)=""/115, 0x73}, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f0000000100)=0x4) 19:42:16 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000280)=0x1c) 19:42:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x0, 0x0) 19:42:16 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f7}]}) prctl$setfpexc(0xc, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0) 19:42:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000040)}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000100), 0x0) [ 797.325460] audit: type=1326 audit(1529696536.323:1741): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17892 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:16 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000280)=0x1c) 19:42:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f7}]}) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000100)) 19:42:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) recvmsg(0xffffffffffffff9c, &(0x7f00000005c0)={&(0x7f0000000380)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @rand_addr}}}, 0x80, &(0x7f0000000500), 0x0, &(0x7f0000000540)=""/115, 0x73}, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f0000000100)=0x4) 19:42:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000040)}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000100), 0x0) 19:42:16 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) prctl$setfpexc(0xc, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0) 19:42:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x0, 0x0) 19:42:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) fdatasync(0xffffffffffffffff) [ 797.548166] audit: type=1326 audit(1529696536.546:1742): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17904 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) recvmsg(0xffffffffffffff9c, &(0x7f00000005c0)={&(0x7f0000000380)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @rand_addr}}}, 0x80, &(0x7f0000000500), 0x0, &(0x7f0000000540)=""/115, 0x73}, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f0000000100)=0x4) 19:42:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000040)}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000100), 0x0) 19:42:16 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) prctl$setfpexc(0xc, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0) 19:42:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x0, 0x0) 19:42:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f7}]}) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000100)) 19:42:17 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$key(0xf, 0x3, 0x2) setreuid(0x0, 0x0) 19:42:17 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) recvmsg(0xffffffffffffff9c, &(0x7f00000005c0)={&(0x7f0000000380)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @rand_addr}}}, 0x80, &(0x7f0000000500), 0x0, &(0x7f0000000540)=""/115, 0x73}, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f0000000100)=0x4) 19:42:17 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000000c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000001c0), &(0x7f0000000000)=0x4) 19:42:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050098}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000100), 0x0) 19:42:17 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) prctl$setfpexc(0xc, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0) 19:42:17 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000000c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000001c0), &(0x7f0000000000)=0x4) 19:42:17 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000280)=0x1c) 19:42:17 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) recvmsg(0xffffffffffffff9c, &(0x7f00000005c0)={&(0x7f0000000380)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @rand_addr}}}, 0x80, &(0x7f0000000500), 0x0, &(0x7f0000000540)=""/115, 0x73}, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f0000000100)=0x4) 19:42:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050098}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000100), 0x0) 19:42:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f7}]}) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000100)) 19:42:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x0, 0x0) 19:42:17 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$key(0xf, 0x3, 0x2) setreuid(0x0, 0x0) [ 798.561716] audit: type=1326 audit(1529696537.560:1743): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17968 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:17 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f7}]}) prctl$setfpexc(0xc, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0) 19:42:17 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) recvmsg(0xffffffffffffff9c, &(0x7f00000005c0)={&(0x7f0000000380)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @rand_addr}}}, 0x80, &(0x7f0000000500), 0x0, &(0x7f0000000540)=""/115, 0x73}, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f0000000100)=0x4) 19:42:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050098}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000100), 0x0) 19:42:17 executing program 1: syz_open_dev$mice(&(0x7f0000000580)='/dev/input/mice\x00', 0x0, 0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000100)) 19:42:17 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$key(0xf, 0x3, 0x2) setreuid(0x0, 0x0) 19:42:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x0, 0x0) 19:42:17 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000000c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000001c0), &(0x7f0000000000)=0x4) 19:42:17 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f7}]}) prctl$setfpexc(0xc, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0) 19:42:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000100), 0x0) 19:42:18 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000280)=0x1c) 19:42:18 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) recvmsg(0xffffffffffffff9c, &(0x7f00000005c0)={&(0x7f0000000380)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @rand_addr}}}, 0x80, &(0x7f0000000500), 0x0, &(0x7f0000000540)=""/115, 0x73}, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f0000000100)=0x4) 19:42:18 executing program 1: syz_open_dev$mice(&(0x7f0000000580)='/dev/input/mice\x00', 0x0, 0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000100)) 19:42:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x0, 0x0) 19:42:18 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$key(0xf, 0x3, 0x2) setreuid(0x0, 0x0) 19:42:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f7}]}) prctl$setfpexc(0xc, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0) 19:42:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) syz_genetlink_get_family_id$fou(&(0x7f00000003c0)='fou\x00') syz_open_dev$random(&(0x7f0000000240)='/dev/random\x00', 0x0, 0x0) 19:42:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) prctl$setfpexc(0xc, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0) 19:42:18 executing program 1: syz_open_dev$mice(&(0x7f0000000580)='/dev/input/mice\x00', 0x0, 0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000100)) 19:42:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x0, 0x0) 19:42:18 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) setreuid(0x0, 0x0) 19:42:18 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) getpid() socket$inet6(0xa, 0x0, 0x0) 19:42:18 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f7}]}) syz_open_dev$mice(&(0x7f0000000580)='/dev/input/mice\x00', 0x0, 0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000100)) 19:42:18 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) setreuid(0x0, 0x0) 19:42:18 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f7}]}) syz_open_dev$mice(&(0x7f0000000580)='/dev/input/mice\x00', 0x0, 0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000100)) 19:42:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000100), 0x0) 19:42:19 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) setreuid(0x0, 0x0) 19:42:19 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x0, 0x0) 19:42:19 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f7}]}) syz_open_dev$mice(&(0x7f0000000580)='/dev/input/mice\x00', 0x0, 0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000100)) 19:42:19 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000100)) 19:42:19 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) recvmsg(0xffffffffffffff9c, &(0x7f00000005c0)={&(0x7f0000000380)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @rand_addr}}}, 0x80, &(0x7f0000000500), 0x0, &(0x7f0000000540)=""/115, 0x73}, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f0000000100)=0x4) 19:42:19 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000080)={'nat\x00', 0x2, [{}, {}]}, 0x48) [ 800.480322] kauditd_printk_skb: 5 callbacks suppressed [ 800.480342] audit: type=1326 audit(1529696539.476:1749): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18066 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) syz_open_dev$mice(&(0x7f0000000580)='/dev/input/mice\x00', 0x0, 0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000100)) 19:42:19 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) prctl$setfpexc(0xc, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0) 19:42:19 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x0, 0x0) 19:42:19 executing program 4: socket$key(0xf, 0x3, 0x2) setreuid(0x0, 0x0) [ 800.655916] audit: type=1326 audit(1529696539.654:1750): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18083 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:19 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x0, 0x0) 19:42:19 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000100)) 19:42:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) syz_open_dev$mice(&(0x7f0000000580)='/dev/input/mice\x00', 0x0, 0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000100)) 19:42:19 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000080)={'nat\x00', 0x2, [{}, {}]}, 0x48) 19:42:19 executing program 4: socket$key(0xf, 0x3, 0x2) setreuid(0x0, 0x0) 19:42:19 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000100), 0x0) 19:42:19 executing program 2: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x0, 0x0) 19:42:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) syz_open_dev$mice(&(0x7f0000000580)='/dev/input/mice\x00', 0x0, 0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000100)) 19:42:19 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000100)) 19:42:20 executing program 4: socket$key(0xf, 0x3, 0x2) setreuid(0x0, 0x0) [ 801.049933] audit: type=1326 audit(1529696540.048:1751): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18114 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) recvmsg(0xffffffffffffff9c, &(0x7f00000005c0)={&(0x7f0000000380)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @rand_addr}}}, 0x80, &(0x7f0000000500), 0x0, &(0x7f0000000540)=""/115, 0x73}, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f0000000100)=0x4) 19:42:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000080)={'nat\x00', 0x2, [{}, {}]}, 0x48) 19:42:20 executing program 2: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x0, 0x0) [ 801.410723] audit: type=1326 audit(1529696540.409:1752): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18131 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:20 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) prctl$setfpexc(0xc, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0) 19:42:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f7}]}) syz_open_dev$mice(&(0x7f0000000580)='/dev/input/mice\x00', 0x0, 0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000100)) 19:42:20 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$key(0xf, 0x3, 0x2) setreuid(0x0, 0x0) 19:42:20 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000100)) 19:42:20 executing program 2: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x0, 0x0) 19:42:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000080)={'nat\x00', 0x2, [{}, {}]}, 0x48) [ 801.610087] audit: type=1326 audit(1529696540.608:1753): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18147 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f7}]}) syz_open_dev$mice(&(0x7f0000000580)='/dev/input/mice\x00', 0x0, 0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000100)) 19:42:20 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$key(0xf, 0x3, 0x2) setreuid(0x0, 0x0) 19:42:20 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000100)) 19:42:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x0, 0x0) 19:42:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000080)={'nat\x00', 0x2, [{}, {}]}, 0x48) 19:42:20 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue0\x00'}) 19:42:20 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$key(0xf, 0x3, 0x2) setreuid(0x0, 0x0) 19:42:21 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket$key(0xf, 0x3, 0x2) setreuid(0x0, 0x0) 19:42:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f7}]}) syz_open_dev$mice(&(0x7f0000000580)='/dev/input/mice\x00', 0x0, 0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000100)) 19:42:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x0, 0x0) 19:42:21 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000100)) 19:42:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 19:42:21 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000080)={'nat\x00', 0x2, [{}, {}]}, 0x48) 19:42:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_dev$mice(&(0x7f0000000580)='/dev/input/mice\x00', 0x0, 0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000100)) 19:42:21 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue0\x00'}) 19:42:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x0, 0x0) 19:42:21 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket$key(0xf, 0x3, 0x2) setreuid(0x0, 0x0) 19:42:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) keyctl$clear(0x7, 0x0) [ 802.566907] audit: type=1326 audit(1529696541.565:1754): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18193 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:21 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket$key(0xf, 0x3, 0x2) setreuid(0x0, 0x0) 19:42:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x0, 0x0) 19:42:21 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000100)) 19:42:21 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000080)={'nat\x00', 0x2, [{}, {}]}, 0x48) 19:42:21 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue0\x00'}) 19:42:21 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) socket$key(0xf, 0x3, 0x2) setreuid(0x0, 0x0) 19:42:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) keyctl$clear(0x7, 0x0) 19:42:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 19:42:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x0, 0x0) 19:42:21 executing program 7: openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000100)) 19:42:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue0\x00'}) 19:42:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_dev$mice(&(0x7f0000000580)='/dev/input/mice\x00', 0x0, 0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000100)) 19:42:22 executing program 0: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000080)={'nat\x00', 0x2, [{}, {}]}, 0x48) 19:42:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x0, 0x0) 19:42:22 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) socket$key(0xf, 0x3, 0x2) setreuid(0x0, 0x0) 19:42:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 19:42:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) keyctl$clear(0x7, 0x0) 19:42:22 executing program 7: openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000100)) 19:42:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue0\x00'}) 19:42:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x0, 0x0) [ 803.540106] audit: type=1326 audit(1529696542.538:1755): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18264 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:22 executing program 7: openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000100)) 19:42:22 executing program 0: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000080)={'nat\x00', 0x2, [{}, {}]}, 0x48) 19:42:22 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) socket$key(0xf, 0x3, 0x2) setreuid(0x0, 0x0) 19:42:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue0\x00'}) 19:42:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) keyctl$clear(0x7, 0x0) 19:42:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) [ 803.671716] audit: type=1326 audit(1529696542.670:1756): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18269 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:22 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000100)) 19:42:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_dev$mice(&(0x7f0000000580)='/dev/input/mice\x00', 0x0, 0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000100)) 19:42:23 executing program 0: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000080)={'nat\x00', 0x2, [{}, {}]}, 0x48) 19:42:23 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$key(0xf, 0x3, 0x2) setreuid(0x0, 0x0) 19:42:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 19:42:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue0\x00'}) 19:42:23 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000100)) 19:42:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) keyctl$clear(0x7, 0x0) [ 804.473660] audit: type=1326 audit(1529696543.472:1757): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18303 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:23 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000080)={'nat\x00', 0x2, [{}, {}]}, 0x48) [ 804.546427] audit: type=1326 audit(1529696543.529:1758): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18311 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x0, 0x0) 19:42:23 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000100)) 19:42:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 19:42:23 executing program 6: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue0\x00'}) 19:42:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) keyctl$clear(0x7, 0x0) 19:42:23 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000080)={'nat\x00', 0x2, [{}, {}]}, 0x48) 19:42:23 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000100)) 19:42:23 executing program 6: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue0\x00'}) 19:42:24 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000080)={'nat\x00', 0x2, [{}, {}]}, 0x48) 19:42:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 19:42:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) keyctl$clear(0x7, 0x0) 19:42:24 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$key(0xf, 0x3, 0x2) setreuid(0x0, 0x0) 19:42:24 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000100)) 19:42:24 executing program 6: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue0\x00'}) 19:42:24 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f00000003c0), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) msgrcv(0x0, &(0x7f00000002c0)={0x0, ""/1}, 0x9, 0x0, 0x0) [ 805.485458] kauditd_printk_skb: 1 callbacks suppressed [ 805.485478] audit: type=1326 audit(1529696544.484:1760): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18352 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:24 executing program 6: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue0\x00'}) 19:42:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x0, 0x0) 19:42:24 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f00000003c0), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) msgrcv(0x0, &(0x7f00000002c0)={0x0, ""/1}, 0x9, 0x0, 0x0) 19:42:24 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000100)) 19:42:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000080)={'nat\x00', 0x2, [{}, {}]}, 0x48) 19:42:24 executing program 3: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 19:42:24 executing program 6: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue0\x00'}) 19:42:24 executing program 5: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) keyctl$clear(0x7, 0x0) 19:42:24 executing program 3: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 19:42:24 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000100)) [ 805.816066] audit: type=1326 audit(1529696544.814:1761): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18385 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000080)={'nat\x00', 0x2, [{}, {}]}, 0x48) 19:42:24 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f00000003c0), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) msgrcv(0x0, &(0x7f00000002c0)={0x0, ""/1}, 0x9, 0x0, 0x0) 19:42:25 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$key(0xf, 0x3, 0x2) setreuid(0x0, 0x0) 19:42:25 executing program 6: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue0\x00'}) 19:42:25 executing program 5: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) keyctl$clear(0x7, 0x0) 19:42:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000080)={'nat\x00', 0x2, [{}, {}]}, 0x48) 19:42:25 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000100)) [ 806.435429] audit: type=1326 audit(1529696545.433:1762): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18409 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:25 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000100)) 19:42:25 executing program 3: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 19:42:25 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f00000003c0), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) msgrcv(0x0, &(0x7f00000002c0)={0x0, ""/1}, 0x9, 0x0, 0x0) 19:42:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000080)={'nat\x00', 0x2, [{}, {}]}, 0x48) 19:42:25 executing program 5: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) keyctl$clear(0x7, 0x0) 19:42:25 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue0\x00'}) 19:42:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x1c, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20) 19:42:25 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000100)) 19:42:25 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) keyctl$clear(0x7, 0x0) 19:42:25 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 19:42:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000080)={'nat\x00', 0x2, [{}, {}]}, 0x48) [ 806.932329] audit: type=1326 audit(1529696545.931:1763): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18446 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:26 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000080)={'nat\x00', 0x2, [{}, {}]}, 0x48) 19:42:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue0\x00'}) 19:42:26 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) keyctl$clear(0x7, 0x0) 19:42:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x1c, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20) 19:42:26 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 19:42:26 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) msgrcv(0x0, &(0x7f00000002c0)={0x0, ""/1}, 0x9, 0x0, 0x0) 19:42:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f00000002c0), 0x0, 0xfffffffffffffffe) fgetxattr(0xffffffffffffffff, &(0x7f0000000100)=@known='trusted.syz\x00', &(0x7f0000000180)=""/178, 0xb2) 19:42:26 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) keyctl$clear(0x7, 0x0) 19:42:26 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 19:42:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue0\x00'}) 19:42:26 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000080)={'nat\x00', 0x2, [{}, {}]}, 0x48) 19:42:26 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) msgrcv(0x0, &(0x7f00000002c0)={0x0, ""/1}, 0x9, 0x0, 0x0) [ 807.591138] audit: type=1326 audit(1529696546.589:1764): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18481 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue0\x00'}) 19:42:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 19:42:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x1c, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20) 19:42:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f00000002c0), 0x0, 0xfffffffffffffffe) fgetxattr(0xffffffffffffffff, &(0x7f0000000100)=@known='trusted.syz\x00', &(0x7f0000000180)=""/178, 0xb2) 19:42:26 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000100)) 19:42:26 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) msgrcv(0x0, &(0x7f00000002c0)={0x0, ""/1}, 0x9, 0x0, 0x0) 19:42:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) keyctl$clear(0x7, 0x0) [ 807.890758] audit: type=1326 audit(1529696546.889:1765): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18506 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 19:42:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue0\x00'}) 19:42:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) keyctl$clear(0x7, 0x0) 19:42:27 executing program 1: get_mempolicy(&(0x7f0000000040), &(0x7f00000003c0), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) msgrcv(0x0, &(0x7f00000002c0)={0x0, ""/1}, 0x9, 0x0, 0x0) 19:42:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f00000002c0), 0x0, 0xfffffffffffffffe) fgetxattr(0xffffffffffffffff, &(0x7f0000000100)=@known='trusted.syz\x00', &(0x7f0000000180)=""/178, 0xb2) 19:42:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x1c, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20) 19:42:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 19:42:27 executing program 1: get_mempolicy(&(0x7f0000000040), &(0x7f00000003c0), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) msgrcv(0x0, &(0x7f00000002c0)={0x0, ""/1}, 0x9, 0x0, 0x0) 19:42:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000080)={'nat\x00', 0x2, [{}, {}]}, 0x48) 19:42:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20) [ 808.508830] audit: type=1326 audit(1529696547.507:1766): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18544 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:27 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000100)) 19:42:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue0\x00'}) 19:42:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) keyctl$clear(0x7, 0x0) 19:42:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 19:42:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f00000002c0), 0x0, 0xfffffffffffffffe) fgetxattr(0xffffffffffffffff, &(0x7f0000000100)=@known='trusted.syz\x00', &(0x7f0000000180)=""/178, 0xb2) 19:42:27 executing program 1: get_mempolicy(&(0x7f0000000040), &(0x7f00000003c0), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) msgrcv(0x0, &(0x7f00000002c0)={0x0, ""/1}, 0x9, 0x0, 0x0) 19:42:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20) [ 808.825306] audit: type=1326 audit(1529696547.824:1767): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18551 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 19:42:27 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f00000003c0), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) msgrcv(0x0, &(0x7f00000002c0)={0x0, ""/1}, 0x9, 0x0, 0x0) 19:42:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20) 19:42:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue0\x00'}) 19:42:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) keyctl$clear(0x7, 0x0) 19:42:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) fgetxattr(0xffffffffffffffff, &(0x7f0000000100)=@known='trusted.syz\x00', &(0x7f0000000180)=""/178, 0xb2) [ 809.034655] audit: type=1326 audit(1529696548.033:1768): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18572 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:28 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f00000003c0), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) msgrcv(0x0, &(0x7f00000002c0)={0x0, ""/1}, 0x9, 0x0, 0x0) 19:42:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000080)={'nat\x00', 0x2, [{}, {}]}, 0x48) 19:42:28 executing program 2: accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x1c, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20) [ 809.442879] audit: type=1326 audit(1529696548.441:1769): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18594 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:28 executing program 2: accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x1c, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20) 19:42:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 19:42:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fb}]}) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) 19:42:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) fgetxattr(0xffffffffffffffff, &(0x7f0000000100)=@known='trusted.syz\x00', &(0x7f0000000180)=""/178, 0xb2) 19:42:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) keyctl$clear(0x7, 0x0) 19:42:28 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f00000003c0), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) msgrcv(0x0, &(0x7f00000002c0)={0x0, ""/1}, 0x9, 0x0, 0x0) 19:42:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 19:42:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) keyctl$clear(0x7, 0x0) 19:42:28 executing program 2: accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x1c, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20) 19:42:28 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) get_mempolicy(&(0x7f0000000040), &(0x7f00000003c0), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) msgrcv(0x0, &(0x7f00000002c0)={0x0, ""/1}, 0x9, 0x0, 0x0) 19:42:28 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue0\x00'}) 19:42:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) fgetxattr(0xffffffffffffffff, &(0x7f0000000100)=@known='trusted.syz\x00', &(0x7f0000000180)=""/178, 0xb2) 19:42:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) signalfd4(0xffffffffffffffff, &(0x7f0000000240), 0x8, 0x0) 19:42:29 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) get_mempolicy(&(0x7f0000000040), &(0x7f00000003c0), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) msgrcv(0x0, &(0x7f00000002c0)={0x0, ""/1}, 0x9, 0x0, 0x0) 19:42:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) keyctl$clear(0x7, 0x0) 19:42:29 executing program 2: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x1c, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20) 19:42:29 executing program 4: add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f00000002c0), 0x0, 0xfffffffffffffffe) fgetxattr(0xffffffffffffffff, &(0x7f0000000100)=@known='trusted.syz\x00', &(0x7f0000000180)=""/178, 0xb2) 19:42:29 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) get_mempolicy(&(0x7f0000000040), &(0x7f00000003c0), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) msgrcv(0x0, &(0x7f00000002c0)={0x0, ""/1}, 0x9, 0x0, 0x0) 19:42:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) signalfd4(0xffffffffffffffff, &(0x7f0000000240), 0x8, 0x0) 19:42:29 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x3, &(0x7f0000000180)) mknod$loop(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0xffffffffffffffff) 19:42:29 executing program 2: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x1c, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20) 19:42:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) 19:42:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 19:42:29 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f00000003c0), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) msgrcv(0x0, &(0x7f00000002c0)={0x0, ""/1}, 0x9, 0x0, 0x0) 19:42:29 executing program 4: add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f00000002c0), 0x0, 0xfffffffffffffffe) fgetxattr(0xffffffffffffffff, &(0x7f0000000100)=@known='trusted.syz\x00', &(0x7f0000000180)=""/178, 0xb2) 19:42:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) signalfd4(0xffffffffffffffff, &(0x7f0000000240), 0x8, 0x0) [ 810.887440] kauditd_printk_skb: 3 callbacks suppressed [ 810.887461] audit: type=1326 audit(1529696549.886:1773): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18677 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue0\x00'}) 19:42:29 executing program 2: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x1c, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20) 19:42:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000040)) 19:42:29 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f00000003c0), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) msgrcv(0x0, &(0x7f00000002c0)={0x0, ""/1}, 0x9, 0x0, 0x0) [ 811.028528] audit: type=1326 audit(1529696550.027:1774): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18682 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) keyctl$clear(0x7, 0x0) 19:42:30 executing program 4: add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f00000002c0), 0x0, 0xfffffffffffffffe) fgetxattr(0xffffffffffffffff, &(0x7f0000000100)=@known='trusted.syz\x00', &(0x7f0000000180)=""/178, 0xb2) 19:42:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) signalfd4(0xffffffffffffffff, &(0x7f0000000240), 0x8, 0x0) 19:42:30 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x1c, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20) 19:42:30 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f00000003c0), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) msgrcv(0x0, &(0x7f00000002c0)={0x0, ""/1}, 0x9, 0x0, 0x0) 19:42:30 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000040)) 19:42:30 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) get_mempolicy(&(0x7f0000000040), &(0x7f00000003c0), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) msgrcv(0x0, &(0x7f00000002c0)={0x0, ""/1}, 0x9, 0x0, 0x0) 19:42:30 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f00000002c0), 0x0, 0xfffffffffffffffe) fgetxattr(0xffffffffffffffff, &(0x7f0000000100)=@known='trusted.syz\x00', &(0x7f0000000180)=""/178, 0xb2) [ 811.376676] audit: type=1326 audit(1529696550.375:1775): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18706 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 811.497831] audit: type=1326 audit(1529696550.496:1776): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18713 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 19:42:30 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x1c, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20) 19:42:30 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000040)) 19:42:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) signalfd4(0xffffffffffffffff, &(0x7f0000000240), 0x8, 0x0) [ 811.846167] audit: type=1326 audit(1529696550.844:1777): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18721 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) signalfd4(0xffffffffffffffff, &(0x7f0000000240), 0x8, 0x0) 19:42:30 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f00000002c0), 0x0, 0xfffffffffffffffe) fgetxattr(0xffffffffffffffff, &(0x7f0000000100)=@known='trusted.syz\x00', &(0x7f0000000180)=""/178, 0xb2) 19:42:30 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x1c, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20) 19:42:30 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000040)) 19:42:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) keyctl$clear(0x7, 0x0) 19:42:31 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) 19:42:31 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f00000002c0), 0x0, 0xfffffffffffffffe) fgetxattr(0xffffffffffffffff, &(0x7f0000000100)=@known='trusted.syz\x00', &(0x7f0000000180)=""/178, 0xb2) 19:42:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x1c, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20) 19:42:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) signalfd4(0xffffffffffffffff, &(0x7f0000000240), 0x8, 0x0) 19:42:31 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000040)) [ 812.350914] audit: type=1326 audit(1529696551.349:1778): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18757 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:31 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) get_mempolicy(&(0x7f0000000040), &(0x7f00000003c0), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) msgrcv(0x0, &(0x7f00000002c0)={0x0, ""/1}, 0x9, 0x0, 0x0) 19:42:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x1c, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20) [ 812.539359] audit: type=1326 audit(1529696551.536:1779): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18768 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x1c, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20) 19:42:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f00000002c0), 0x0, 0xfffffffffffffffe) fgetxattr(0xffffffffffffffff, &(0x7f0000000100)=@known='trusted.syz\x00', &(0x7f0000000180)=""/178, 0xb2) 19:42:31 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000040)) 19:42:31 executing program 7: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) signalfd4(0xffffffffffffffff, &(0x7f0000000240), 0x8, 0x0) 19:42:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f7}]}) socket$inet(0x2, 0x0, 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) 19:42:31 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f00000002c0)={{&(0x7f0000ffe000/0x1000)=nil, 0x1000}}) 19:42:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x1c, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20) 19:42:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f00000002c0), 0x0, 0xfffffffffffffffe) fgetxattr(0xffffffffffffffff, &(0x7f0000000100)=@known='trusted.syz\x00', &(0x7f0000000180)=""/178, 0xb2) [ 812.930164] audit: type=1326 audit(1529696551.928:1780): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18788 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:32 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000040)) 19:42:32 executing program 7: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) signalfd4(0xffffffffffffffff, &(0x7f0000000240), 0x8, 0x0) 19:42:32 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f00000002c0)={{&(0x7f0000ffe000/0x1000)=nil, 0x1000}}) 19:42:32 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f7}]}) socket$inet(0x2, 0x0, 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) 19:42:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f00000002c0), 0x0, 0xfffffffffffffffe) fgetxattr(0xffffffffffffffff, &(0x7f0000000100)=@known='trusted.syz\x00', &(0x7f0000000180)=""/178, 0xb2) 19:42:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fb}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) get_thread_area(&(0x7f00000003c0)) 19:42:32 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) get_mempolicy(&(0x7f0000000040), &(0x7f00000003c0), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) msgrcv(0x0, &(0x7f00000002c0)={0x0, ""/1}, 0x9, 0x0, 0x0) 19:42:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f00000002c0), 0x0, 0xfffffffffffffffe) fgetxattr(0xffffffffffffffff, &(0x7f0000000100)=@known='trusted.syz\x00', &(0x7f0000000180)=""/178, 0xb2) 19:42:32 executing program 7: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) signalfd4(0xffffffffffffffff, &(0x7f0000000240), 0x8, 0x0) 19:42:32 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000040)) 19:42:32 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f7}]}) socket$inet(0x2, 0x0, 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) 19:42:32 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f00000002c0)={{&(0x7f0000ffe000/0x1000)=nil, 0x1000}}) 19:42:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fb}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) get_thread_area(&(0x7f00000003c0)) 19:42:32 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000040)) [ 813.571689] audit: type=1326 audit(1529696552.570:1781): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18831 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x1c, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20) 19:42:32 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) signalfd4(0xffffffffffffffff, &(0x7f0000000240), 0x8, 0x0) 19:42:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f00000002c0), 0x0, 0xfffffffffffffffe) fgetxattr(0xffffffffffffffff, &(0x7f0000000100)=@known='trusted.syz\x00', &(0x7f0000000180)=""/178, 0xb2) 19:42:32 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f7}]}) socket$inet(0x2, 0x0, 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) 19:42:32 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f00000002c0)={{&(0x7f0000ffe000/0x1000)=nil, 0x1000}}) 19:42:32 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000040)) 19:42:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fb}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) get_thread_area(&(0x7f00000003c0)) 19:42:32 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) signalfd4(0xffffffffffffffff, &(0x7f0000000240), 0x8, 0x0) [ 813.896188] audit: type=1326 audit(1529696552.894:1782): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18857 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:33 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) signalfd4(0xffffffffffffffff, &(0x7f0000000240), 0x8, 0x0) 19:42:33 executing program 0: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000040)) 19:42:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f00000002c0), 0x0, 0xfffffffffffffffe) fgetxattr(0xffffffffffffffff, &(0x7f0000000100)=@known='trusted.syz\x00', &(0x7f0000000180)=""/178, 0xb2) 19:42:33 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f7}]}) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) 19:42:33 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fb}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) get_thread_area(&(0x7f00000003c0)) 19:42:33 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f00000002c0)={{&(0x7f0000ffe000/0x1000)=nil, 0x1000}}) 19:42:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) getpgrp(0xffffffffffffffff) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'veth0_to_team\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) 19:42:33 executing program 0: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000040)) 19:42:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x1c, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20) 19:42:33 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) signalfd4(0xffffffffffffffff, &(0x7f0000000240), 0x8, 0x0) 19:42:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f00000002c0), 0x0, 0xfffffffffffffffe) fgetxattr(0xffffffffffffffff, &(0x7f0000000100)=@known='trusted.syz\x00', &(0x7f0000000180)=""/178, 0xb2) 19:42:33 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f00000002c0)={{&(0x7f0000ffe000/0x1000)=nil, 0x1000}}) 19:42:33 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f7}]}) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) 19:42:33 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fb}]}) get_thread_area(&(0x7f00000003c0)) 19:42:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) getpgrp(0xffffffffffffffff) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'veth0_to_team\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) 19:42:33 executing program 0: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000040)) 19:42:33 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000040)) 19:42:33 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) signalfd4(0xffffffffffffffff, &(0x7f0000000240), 0x8, 0x0) 19:42:33 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f00000002c0)={{&(0x7f0000ffe000/0x1000)=nil, 0x1000}}) 19:42:33 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fb}]}) get_thread_area(&(0x7f00000003c0)) 19:42:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f7}]}) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) 19:42:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) getpgrp(0xffffffffffffffff) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'veth0_to_team\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) 19:42:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000040)) 19:42:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) signalfd4(0xffffffffffffffff, &(0x7f0000000240), 0x8, 0x0) 19:42:34 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f00000002c0), 0x0, 0xfffffffffffffffe) fgetxattr(0xffffffffffffffff, &(0x7f0000000100)=@known='trusted.syz\x00', &(0x7f0000000180)=""/178, 0xb2) 19:42:34 executing program 6: getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f00000002c0)={{&(0x7f0000ffe000/0x1000)=nil, 0x1000}}) 19:42:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fb}]}) get_thread_area(&(0x7f00000003c0)) 19:42:34 executing program 3: socket$inet(0x2, 0x0, 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) 19:42:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) getpgrp(0xffffffffffffffff) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'veth0_to_team\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) 19:42:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000040)) 19:42:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) signalfd4(0xffffffffffffffff, &(0x7f0000000240), 0x8, 0x0) 19:42:34 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) 19:42:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) signalfd4(0xffffffffffffffff, &(0x7f0000000240), 0x8, 0x0) 19:42:34 executing program 5: openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) get_thread_area(&(0x7f00000003c0)) 19:42:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000040)) 19:42:34 executing program 6: getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f00000002c0)={{&(0x7f0000ffe000/0x1000)=nil, 0x1000}}) 19:42:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'veth0_to_team\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) 19:42:35 executing program 3: socket$inet(0x2, 0x0, 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) 19:42:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) 19:42:35 executing program 5: openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) get_thread_area(&(0x7f00000003c0)) 19:42:35 executing program 6: getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f00000002c0)={{&(0x7f0000ffe000/0x1000)=nil, 0x1000}}) 19:42:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f00000002c0), 0x0, 0xfffffffffffffffe) fgetxattr(0xffffffffffffffff, &(0x7f0000000100)=@known='trusted.syz\x00', &(0x7f0000000180)=""/178, 0xb2) 19:42:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) signalfd4(0xffffffffffffffff, &(0x7f0000000240), 0x8, 0x0) 19:42:35 executing program 5: openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) get_thread_area(&(0x7f00000003c0)) 19:42:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000040)) 19:42:35 executing program 3: socket$inet(0x2, 0x0, 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) 19:42:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'veth0_to_team\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) 19:42:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) [ 816.805833] kauditd_printk_skb: 3 callbacks suppressed [ 816.805853] audit: type=1326 audit(1529696555.804:1786): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19017 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:35 executing program 6: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f00000002c0)={{&(0x7f0000ffe000/0x1000)=nil, 0x1000}}) 19:42:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) signalfd4(0xffffffffffffffff, &(0x7f0000000240), 0x8, 0x0) 19:42:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000040)) 19:42:35 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fb}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) get_thread_area(&(0x7f00000003c0)) 19:42:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'veth0_to_team\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) 19:42:36 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f7}]}) socket$inet(0x2, 0x0, 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) 19:42:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) [ 816.966182] audit: type=1326 audit(1529696555.962:1787): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19025 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:36 executing program 6: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f00000002c0)={{&(0x7f0000ffe000/0x1000)=nil, 0x1000}}) 19:42:36 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000040)) [ 817.201716] audit: type=1326 audit(1529696556.200:1788): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19048 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:36 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f7}]}) socket$inet(0x2, 0x0, 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) 19:42:36 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fb}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) get_thread_area(&(0x7f00000003c0)) 19:42:36 executing program 1: getpgrp(0xffffffffffffffff) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'veth0_to_team\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) 19:42:36 executing program 6: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f00000002c0)={{&(0x7f0000ffe000/0x1000)=nil, 0x1000}}) 19:42:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) 19:42:36 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) inotify_add_watch(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) 19:42:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) 19:42:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f00000002c0)={{&(0x7f0000ffe000/0x1000)=nil, 0x1000}}) 19:42:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) signalfd4(0xffffffffffffffff, &(0x7f0000000240), 0x8, 0x0) 19:42:36 executing program 1: getpgrp(0xffffffffffffffff) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'veth0_to_team\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) 19:42:36 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fb}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) get_thread_area(&(0x7f00000003c0)) 19:42:36 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) inotify_add_watch(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) 19:42:36 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f7}]}) socket$inet(0x2, 0x0, 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) 19:42:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f00000002c0)={{&(0x7f0000ffe000/0x1000)=nil, 0x1000}}) [ 818.030445] audit: type=1326 audit(1529696557.029:1789): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19087 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) 19:42:37 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000040)) 19:42:37 executing program 1: getpgrp(0xffffffffffffffff) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'veth0_to_team\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) 19:42:37 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) get_thread_area(&(0x7f00000003c0)) 19:42:37 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) 19:42:37 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) inotify_add_watch(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) [ 818.248813] audit: type=1326 audit(1529696557.247:1790): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19108 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f00000002c0)={{&(0x7f0000ffe000/0x1000)=nil, 0x1000}}) 19:42:37 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) getpgrp(0xffffffffffffffff) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'veth0_to_team\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) 19:42:37 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) 19:42:37 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) get_thread_area(&(0x7f00000003c0)) 19:42:37 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) signalfd4(0xffffffffffffffff, &(0x7f0000000240), 0x8, 0x0) 19:42:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f00000002c0)={{&(0x7f0000ffe000/0x1000)=nil, 0x1000}}) 19:42:37 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) getpgrp(0xffffffffffffffff) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'veth0_to_team\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) 19:42:37 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) 19:42:37 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) get_thread_area(&(0x7f00000003c0)) 19:42:37 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) 19:42:37 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) inotify_add_watch(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) [ 818.993655] audit: type=1326 audit(1529696557.992:1791): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19152 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000040)) 19:42:38 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) 19:42:38 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) getpgrp(0xffffffffffffffff) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'veth0_to_team\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) 19:42:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f00000002c0)={{&(0x7f0000ffe000/0x1000)=nil, 0x1000}}) 19:42:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fb}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) get_thread_area(&(0x7f00000003c0)) 19:42:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) 19:42:38 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) inotify_add_watch(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) [ 819.234535] audit: type=1326 audit(1529696558.233:1792): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19168 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fb}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) get_thread_area(&(0x7f00000003c0)) 19:42:38 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) 19:42:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fb}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) get_thread_area(&(0x7f00000003c0)) 19:42:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) getpgrp(0xffffffffffffffff) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'veth0_to_team\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) 19:42:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f00000002c0)={{&(0x7f0000ffe000/0x1000)=nil, 0x1000}}) 19:42:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f7}]}) socket$inet(0x2, 0x0, 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) 19:42:38 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) inotify_add_watch(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) 19:42:38 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) 19:42:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ee}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000001b80), 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) 19:42:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f7}]}) socket$inet(0x2, 0x0, 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) 19:42:39 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) 19:42:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) getpgrp(0xffffffffffffffff) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'veth0_to_team\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) 19:42:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) get_thread_area(&(0x7f00000003c0)) 19:42:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f00000002c0)={{&(0x7f0000ffe000/0x1000)=nil, 0x1000}}) 19:42:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ee}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000001b80), 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) 19:42:39 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) inotify_add_watch(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) 19:42:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) setns(0xffffffffffffffff, 0x0) [ 820.207866] audit: type=1326 audit(1529696559.206:1793): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19218 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:39 executing program 4: get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) inotify_add_watch(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) 19:42:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) [ 820.285260] audit: type=1326 audit(1529696559.264:1794): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19223 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) getpgrp(0xffffffffffffffff) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'veth0_to_team\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) 19:42:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f7}]}) socket$inet(0x2, 0x0, 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) 19:42:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ee}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000001b80), 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) 19:42:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) setns(0xffffffffffffffff, 0x0) 19:42:39 executing program 4: get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) inotify_add_watch(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) 19:42:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) getpgrp(0xffffffffffffffff) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'veth0_to_team\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) 19:42:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) 19:42:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) 19:42:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ee}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000001b80), 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) [ 820.730506] audit: type=1326 audit(1529696559.729:1795): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19267 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) get_thread_area(&(0x7f00000003c0)) 19:42:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f00000002c0)={{&(0x7f0000ffe000/0x1000)=nil, 0x1000}}) 19:42:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) getpgrp(0xffffffffffffffff) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'veth0_to_team\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) 19:42:40 executing program 4: get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) inotify_add_watch(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) 19:42:40 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) setns(0xffffffffffffffff, 0x0) 19:42:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) 19:42:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ee}]}) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) 19:42:40 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) inotify_add_watch(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) 19:42:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) 19:42:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) getpgrp(0xffffffffffffffff) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'veth0_to_team\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) 19:42:40 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) setns(0xffffffffffffffff, 0x0) 19:42:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ee}]}) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) 19:42:40 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) inotify_add_watch(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) 19:42:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) 19:42:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) 19:42:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) getpgrp(0xffffffffffffffff) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'veth0_to_team\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) 19:42:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) get_thread_area(&(0x7f00000003c0)) 19:42:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f00000002c0)={{&(0x7f0000ffe000/0x1000)=nil, 0x1000}}) 19:42:41 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) inotify_add_watch(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) 19:42:41 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ee}]}) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) 19:42:41 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) setns(0xffffffffffffffff, 0x0) 19:42:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) [ 822.070084] kauditd_printk_skb: 4 callbacks suppressed [ 822.070108] audit: type=1326 audit(1529696561.068:1800): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19330 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) [ 822.146427] audit: type=1326 audit(1529696561.145:1801): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19341 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:41 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) inotify_add_watch(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) 19:42:41 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) setns(0xffffffffffffffff, 0x0) 19:42:41 executing program 7: recvmmsg(0xffffffffffffff9c, &(0x7f0000001b80), 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) [ 822.241342] audit: type=1326 audit(1529696561.240:1802): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19343 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:41 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) inotify_add_watch(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) 19:42:41 executing program 7: recvmmsg(0xffffffffffffff9c, &(0x7f0000001b80), 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) 19:42:41 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) setns(0xffffffffffffffff, 0x0) 19:42:41 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) inotify_add_watch(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) 19:42:41 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) inotify_add_watch(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) 19:42:41 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) [ 822.662813] audit: type=1326 audit(1529696561.661:1803): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19375 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:41 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) getpgrp(0xffffffffffffffff) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'veth0_to_team\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) [ 822.989903] audit: type=1326 audit(1529696561.988:1804): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19381 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:42 executing program 7: recvmmsg(0xffffffffffffff9c, &(0x7f0000001b80), 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) 19:42:42 executing program 0: creat(&(0x7f0000000040)='./file0\x00', 0x0) setns(0xffffffffffffffff, 0x0) 19:42:42 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) inotify_add_watch(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) 19:42:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) recvmsg(0xffffffffffffff9c, &(0x7f00000005c0)={&(0x7f0000000380)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @rand_addr}}}, 0x80, &(0x7f0000000500), 0x0, &(0x7f0000000540)=""/115, 0x73}, 0x0) mount(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000a80)='./file0\x00', &(0x7f0000000a40)='ramfs\x00', 0x0, &(0x7f0000000b80)) 19:42:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x78) 19:42:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) 19:42:42 executing program 0: creat(&(0x7f0000000040)='./file0\x00', 0x0) setns(0xffffffffffffffff, 0x0) 19:42:42 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) inotify_add_watch(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) 19:42:42 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ee}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000001b80), 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) 19:42:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) recvmsg(0xffffffffffffff9c, &(0x7f00000005c0)={&(0x7f0000000380)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @rand_addr}}}, 0x80, &(0x7f0000000500), 0x0, &(0x7f0000000540)=""/115, 0x73}, 0x0) mount(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000a80)='./file0\x00', &(0x7f0000000a40)='ramfs\x00', 0x0, &(0x7f0000000b80)) 19:42:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x78) 19:42:42 executing program 0: creat(&(0x7f0000000040)='./file0\x00', 0x0) setns(0xffffffffffffffff, 0x0) 19:42:42 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ee}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000001b80), 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) 19:42:42 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) inotify_add_watch(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) [ 823.343583] audit: type=1326 audit(1529696562.342:1805): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19408 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 823.483141] audit: type=1326 audit(1529696562.481:1806): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19422 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:42 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ee}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000001b80), 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) 19:42:42 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) getpgrp(0xffffffffffffffff) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'veth0_to_team\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) 19:42:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) recvmsg(0xffffffffffffff9c, &(0x7f00000005c0)={&(0x7f0000000380)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @rand_addr}}}, 0x80, &(0x7f0000000500), 0x0, &(0x7f0000000540)=""/115, 0x73}, 0x0) mount(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000a80)='./file0\x00', &(0x7f0000000a40)='ramfs\x00', 0x0, &(0x7f0000000b80)) 19:42:42 executing program 0: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) setns(0xffffffffffffffff, 0x0) 19:42:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x78) 19:42:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) request_key(&(0x7f0000000080)='.request_key_auth\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000140)='posix_acl_access-)wlan0][]&vboxnet0\x00', 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000180)) 19:42:42 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) recvmmsg(0xffffffffffffff9c, &(0x7f0000001b80), 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) [ 823.965073] audit: type=1326 audit(1529696562.963:1807): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19445 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) 19:42:43 executing program 0: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) setns(0xffffffffffffffff, 0x0) 19:42:43 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x78) 19:42:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) recvmmsg(0xffffffffffffff9c, &(0x7f0000001b80), 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) 19:42:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) recvmsg(0xffffffffffffff9c, &(0x7f00000005c0)={&(0x7f0000000380)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @rand_addr}}}, 0x80, &(0x7f0000000500), 0x0, &(0x7f0000000540)=""/115, 0x73}, 0x0) mount(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000a80)='./file0\x00', &(0x7f0000000a40)='ramfs\x00', 0x0, &(0x7f0000000b80)) 19:42:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) request_key(&(0x7f0000000080)='.request_key_auth\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000140)='posix_acl_access-)wlan0][]&vboxnet0\x00', 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000180)) [ 824.288269] audit: type=1326 audit(1529696563.287:1808): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19465 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:43 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x78) 19:42:43 executing program 0: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) setns(0xffffffffffffffff, 0x0) 19:42:43 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) inotify_add_watch(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) 19:42:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) recvmmsg(0xffffffffffffff9c, &(0x7f0000001b80), 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) [ 824.511606] audit: type=1326 audit(1529696563.510:1809): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19478 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) creat(&(0x7f0000000040)='./file0\x00', 0x0) setns(0xffffffffffffffff, 0x0) 19:42:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) mount(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000a80)='./file0\x00', &(0x7f0000000a40)='ramfs\x00', 0x0, &(0x7f0000000b80)) 19:42:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ee}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000001b80), 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) 19:42:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) request_key(&(0x7f0000000080)='.request_key_auth\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000140)='posix_acl_access-)wlan0][]&vboxnet0\x00', 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000180)) 19:42:43 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x78) 19:42:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) getpgrp(0xffffffffffffffff) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000400)={0x0, {{0x2, 0x0, @multicast1=0xe0000001}}, {{0x2}}}, 0x108) 19:42:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) getpgrp(0xffffffffffffffff) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000400)={0x0, {{0x2, 0x0, @multicast1=0xe0000001}}, {{0x2}}}, 0x108) 19:42:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) mount(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000a80)='./file0\x00', &(0x7f0000000a40)='ramfs\x00', 0x0, &(0x7f0000000b80)) 19:42:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x78) 19:42:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ee}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000001b80), 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) 19:42:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) request_key(&(0x7f0000000080)='.request_key_auth\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000140)='posix_acl_access-)wlan0][]&vboxnet0\x00', 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000180)) 19:42:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) creat(&(0x7f0000000040)='./file0\x00', 0x0) setns(0xffffffffffffffff, 0x0) 19:42:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) getpid() flock(0xffffffffffffffff, 0x0) 19:42:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ee}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000001b80), 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) 19:42:44 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) inotify_add_watch(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) 19:42:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) creat(&(0x7f0000000040)='./file0\x00', 0x0) setns(0xffffffffffffffff, 0x0) 19:42:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) mount(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000a80)='./file0\x00', &(0x7f0000000a40)='ramfs\x00', 0x0, &(0x7f0000000b80)) 19:42:44 executing program 6: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x78) 19:42:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000180)) 19:42:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) getpgrp(0xffffffffffffffff) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000400)={0x0, {{0x2, 0x0, @multicast1=0xe0000001}}, {{0x2}}}, 0x108) 19:42:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000001b80), 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) 19:42:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) getpid() flock(0xffffffffffffffff, 0x0) 19:42:44 executing program 6: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x78) 19:42:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) getpgrp(0xffffffffffffffff) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000400)={0x0, {{0x2, 0x0, @multicast1=0xe0000001}}, {{0x2}}}, 0x108) 19:42:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) setns(0xffffffffffffffff, 0x0) 19:42:44 executing program 5: recvmsg(0xffffffffffffff9c, &(0x7f00000005c0)={&(0x7f0000000380)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @rand_addr}}}, 0x80, &(0x7f0000000500), 0x0, &(0x7f0000000540)=""/115, 0x73}, 0x0) mount(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000a80)='./file0\x00', &(0x7f0000000a40)='ramfs\x00', 0x0, &(0x7f0000000b80)) 19:42:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000180)) 19:42:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) getpid() flock(0xffffffffffffffff, 0x0) 19:42:44 executing program 6: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x78) 19:42:44 executing program 5: recvmsg(0xffffffffffffff9c, &(0x7f00000005c0)={&(0x7f0000000380)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @rand_addr}}}, 0x80, &(0x7f0000000500), 0x0, &(0x7f0000000540)=""/115, 0x73}, 0x0) mount(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000a80)='./file0\x00', &(0x7f0000000a40)='ramfs\x00', 0x0, &(0x7f0000000b80)) 19:42:45 executing program 6: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x78) 19:42:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) setns(0xffffffffffffffff, 0x0) 19:42:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000180)) 19:42:45 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000400)={0x0, {{0x2, 0x0, @multicast1=0xe0000001}}, {{0x2}}}, 0x108) 19:42:45 executing program 5: recvmsg(0xffffffffffffff9c, &(0x7f00000005c0)={&(0x7f0000000380)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @rand_addr}}}, 0x80, &(0x7f0000000500), 0x0, &(0x7f0000000540)=""/115, 0x73}, 0x0) mount(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000a80)='./file0\x00', &(0x7f0000000a40)='ramfs\x00', 0x0, &(0x7f0000000b80)) 19:42:45 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) getpid() flock(0xffffffffffffffff, 0x0) 19:42:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000001b80), 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) 19:42:45 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 19:42:45 executing program 6: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x78) 19:42:45 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) recvmsg(0xffffffffffffff9c, &(0x7f00000005c0)={&(0x7f0000000380)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @rand_addr}}}, 0x80, &(0x7f0000000500), 0x0, &(0x7f0000000540)=""/115, 0x73}, 0x0) mount(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000a80)='./file0\x00', &(0x7f0000000a40)='ramfs\x00', 0x0, &(0x7f0000000b80)) 19:42:45 executing program 3: request_key(&(0x7f0000000080)='.request_key_auth\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000140)='posix_acl_access-)wlan0][]&vboxnet0\x00', 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000180)) 19:42:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) setns(0xffffffffffffffff, 0x0) 19:42:45 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) flock(0xffffffffffffffff, 0x0) 19:42:45 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000400)={0x0, {{0x2, 0x0, @multicast1=0xe0000001}}, {{0x2}}}, 0x108) 19:42:45 executing program 3: request_key(&(0x7f0000000080)='.request_key_auth\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000140)='posix_acl_access-)wlan0][]&vboxnet0\x00', 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000180)) 19:42:45 executing program 6: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x78) 19:42:45 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) recvmsg(0xffffffffffffff9c, &(0x7f00000005c0)={&(0x7f0000000380)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @rand_addr}}}, 0x80, &(0x7f0000000500), 0x0, &(0x7f0000000540)=""/115, 0x73}, 0x0) mount(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000a80)='./file0\x00', &(0x7f0000000a40)='ramfs\x00', 0x0, &(0x7f0000000b80)) 19:42:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) setns(0xffffffffffffffff, 0x0) 19:42:45 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 19:42:46 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) flock(0xffffffffffffffff, 0x0) 19:42:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000400)={0x0, {{0x2, 0x0, @multicast1=0xe0000001}}, {{0x2}}}, 0x108) 19:42:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x78) 19:42:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000001b80), 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) 19:42:46 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) recvmsg(0xffffffffffffff9c, &(0x7f00000005c0)={&(0x7f0000000380)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @rand_addr}}}, 0x80, &(0x7f0000000500), 0x0, &(0x7f0000000540)=""/115, 0x73}, 0x0) mount(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000a80)='./file0\x00', &(0x7f0000000a40)='ramfs\x00', 0x0, &(0x7f0000000b80)) 19:42:46 executing program 3: request_key(&(0x7f0000000080)='.request_key_auth\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000140)='posix_acl_access-)wlan0][]&vboxnet0\x00', 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000180)) 19:42:46 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 19:42:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x78) 19:42:46 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) flock(0xffffffffffffffff, 0x0) 19:42:46 executing program 1: getpgrp(0xffffffffffffffff) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000400)={0x0, {{0x2, 0x0, @multicast1=0xe0000001}}, {{0x2}}}, 0x108) 19:42:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x78) 19:42:46 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) request_key(&(0x7f0000000080)='.request_key_auth\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000140)='posix_acl_access-)wlan0][]&vboxnet0\x00', 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000180)) [ 827.626518] kauditd_printk_skb: 4 callbacks suppressed [ 827.626542] audit: type=1326 audit(1529696566.625:1814): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19664 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) recvmsg(0xffffffffffffff9c, &(0x7f00000005c0)={&(0x7f0000000380)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @rand_addr}}}, 0x80, &(0x7f0000000500), 0x0, &(0x7f0000000540)=""/115, 0x73}, 0x0) mount(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000a80)='./file0\x00', &(0x7f0000000a40)='ramfs\x00', 0x0, &(0x7f0000000b80)) 19:42:46 executing program 1: getpgrp(0xffffffffffffffff) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000400)={0x0, {{0x2, 0x0, @multicast1=0xe0000001}}, {{0x2}}}, 0x108) 19:42:46 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) setns(0xffffffffffffffff, 0x0) 19:42:46 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 19:42:46 executing program 1: getpgrp(0xffffffffffffffff) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000400)={0x0, {{0x2, 0x0, @multicast1=0xe0000001}}, {{0x2}}}, 0x108) 19:42:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x78) 19:42:46 executing program 2: getpid() flock(0xffffffffffffffff, 0x0) [ 827.992942] audit: type=1326 audit(1529696566.991:1815): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19693 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:47 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 19:42:47 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) recvmsg(0xffffffffffffff9c, &(0x7f00000005c0)={&(0x7f0000000380)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @rand_addr}}}, 0x80, &(0x7f0000000500), 0x0, &(0x7f0000000540)=""/115, 0x73}, 0x0) mount(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000a80)='./file0\x00', &(0x7f0000000a40)='ramfs\x00', 0x0, &(0x7f0000000b80)) 19:42:47 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) request_key(&(0x7f0000000080)='.request_key_auth\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000140)='posix_acl_access-)wlan0][]&vboxnet0\x00', 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000180)) 19:42:47 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x78) 19:42:47 executing program 2: getpid() flock(0xffffffffffffffff, 0x0) 19:42:47 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) getpgrp(0xffffffffffffffff) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000400)={0x0, {{0x2, 0x0, @multicast1=0xe0000001}}, {{0x2}}}, 0x108) 19:42:47 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f00000002c0), 0x0, 0xfffffffffffffffe) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f00000000c0)) 19:42:47 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x78) 19:42:47 executing program 2: getpid() flock(0xffffffffffffffff, 0x0) 19:42:47 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) recvmsg(0xffffffffffffff9c, &(0x7f00000005c0)={&(0x7f0000000380)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @rand_addr}}}, 0x80, &(0x7f0000000500), 0x0, &(0x7f0000000540)=""/115, 0x73}, 0x0) mount(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000a80)='./file0\x00', &(0x7f0000000a40)='ramfs\x00', 0x0, &(0x7f0000000b80)) 19:42:47 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) request_key(&(0x7f0000000080)='.request_key_auth\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000140)='posix_acl_access-)wlan0][]&vboxnet0\x00', 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000180)) 19:42:47 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) getpgrp(0xffffffffffffffff) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000400)={0x0, {{0x2, 0x0, @multicast1=0xe0000001}}, {{0x2}}}, 0x108) 19:42:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) setns(0xffffffffffffffff, 0x0) 19:42:47 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 19:42:47 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x78) 19:42:47 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) getpgrp(0xffffffffffffffff) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000400)={0x0, {{0x2, 0x0, @multicast1=0xe0000001}}, {{0x2}}}, 0x108) 19:42:47 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) getpid() flock(0xffffffffffffffff, 0x0) 19:42:47 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f00000002c0), 0x0, 0xfffffffffffffffe) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f00000000c0)) 19:42:47 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) recvmsg(0xffffffffffffff9c, &(0x7f00000005c0)={&(0x7f0000000380)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @rand_addr}}}, 0x80, &(0x7f0000000500), 0x0, &(0x7f0000000540)=""/115, 0x73}, 0x0) mount(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000a80)='./file0\x00', &(0x7f0000000a40)='ramfs\x00', 0x0, &(0x7f0000000b80)) 19:42:47 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) request_key(&(0x7f0000000080)='.request_key_auth\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000140)='posix_acl_access-)wlan0][]&vboxnet0\x00', 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000180)) [ 828.986685] audit: type=1326 audit(1529696567.985:1816): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19741 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:48 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) getpid() flock(0xffffffffffffffff, 0x0) 19:42:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) recvmsg(0xffffffffffffff9c, &(0x7f00000005c0)={&(0x7f0000000380)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @rand_addr}}}, 0x80, &(0x7f0000000500), 0x0, &(0x7f0000000540)=""/115, 0x73}, 0x0) mount(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000a80)='./file0\x00', &(0x7f0000000a40)='ramfs\x00', 0x0, &(0x7f0000000b80)) [ 829.071551] audit: type=1326 audit(1529696568.046:1817): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19755 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) getpgrp(0xffffffffffffffff) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000400)={0x0, {{0x2, 0x0, @multicast1=0xe0000001}}, {{0x2}}}, 0x108) 19:42:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) request_key(&(0x7f0000000080)='.request_key_auth\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000140)='posix_acl_access-)wlan0][]&vboxnet0\x00', 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000180)) 19:42:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 19:42:48 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) getpid() flock(0xffffffffffffffff, 0x0) 19:42:48 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f00000002c0), 0x0, 0xfffffffffffffffe) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f00000000c0)) 19:42:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) request_key(&(0x7f0000000080)='.request_key_auth\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000140)='posix_acl_access-)wlan0][]&vboxnet0\x00', 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000180)) 19:42:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x78) 19:42:48 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 19:42:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) getpid() flock(0xffffffffffffffff, 0x0) 19:42:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) recvmsg(0xffffffffffffff9c, &(0x7f00000005c0)={&(0x7f0000000380)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @rand_addr}}}, 0x80, &(0x7f0000000500), 0x0, &(0x7f0000000540)=""/115, 0x73}, 0x0) mount(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000a80)='./file0\x00', &(0x7f0000000a40)='ramfs\x00', 0x0, &(0x7f0000000b80)) 19:42:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) request_key(&(0x7f0000000080)='.request_key_auth\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000140)='posix_acl_access-)wlan0][]&vboxnet0\x00', 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000180)) 19:42:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) getpgrp(0xffffffffffffffff) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000400)={0x0, {{0x2, 0x0, @multicast1=0xe0000001}}, {{0x2}}}, 0x108) 19:42:48 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f00000002c0), 0x0, 0xfffffffffffffffe) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f00000000c0)) 19:42:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000440)=""/245) [ 829.999713] audit: type=1326 audit(1529696568.998:1818): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19795 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:49 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) getpgrp(0xffffffffffffffff) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000400)={0x0, {{0x2, 0x0, @multicast1=0xe0000001}}, {{0x2}}}, 0x108) 19:42:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) request_key(&(0x7f0000000080)='.request_key_auth\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000140)='posix_acl_access-)wlan0][]&vboxnet0\x00', 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000180)) 19:42:49 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 19:42:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) getpid() flock(0xffffffffffffffff, 0x0) 19:42:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) recvmsg(0xffffffffffffff9c, &(0x7f00000005c0)={&(0x7f0000000380)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @rand_addr}}}, 0x80, &(0x7f0000000500), 0x0, &(0x7f0000000540)=""/115, 0x73}, 0x0) mount(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000a80)='./file0\x00', &(0x7f0000000a40)='ramfs\x00', 0x0, &(0x7f0000000b80)) 19:42:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) request_key(&(0x7f0000000080)='.request_key_auth\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000140)='posix_acl_access-)wlan0][]&vboxnet0\x00', 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000180)) [ 830.224933] audit: type=1326 audit(1529696569.223:1819): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19816 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f00000000c0)) 19:42:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000440)=""/245) 19:42:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) getpid() flock(0xffffffffffffffff, 0x0) 19:42:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) request_key(&(0x7f0000000080)='.request_key_auth\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000140)='posix_acl_access-)wlan0][]&vboxnet0\x00', 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000180)) 19:42:49 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) getpgrp(0xffffffffffffffff) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000400)={0x0, {{0x2, 0x0, @multicast1=0xe0000001}}, {{0x2}}}, 0x108) 19:42:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f00000000c0)) 19:42:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x78) 19:42:49 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 19:42:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000440)=""/245) [ 830.935362] audit: type=1326 audit(1529696569.934:1820): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19843 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:50 executing program 4: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 831.007741] audit: type=1326 audit(1529696569.982:1821): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19852 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:50 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) getpgrp(0xffffffffffffffff) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000400)={0x0, {{0x2, 0x0, @multicast1=0xe0000001}}, {{0x2}}}, 0x108) 19:42:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) getpid() flock(0xffffffffffffffff, 0x0) 19:42:50 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f00000000c0)) 19:42:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) recvmsg(0xffffffffffffff9c, &(0x7f00000005c0)={&(0x7f0000000380)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @rand_addr}}}, 0x80, &(0x7f0000000500), 0x0, &(0x7f0000000540)=""/115, 0x73}, 0x0) mount(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000a80)='./file0\x00', &(0x7f0000000a40)='ramfs\x00', 0x0, &(0x7f0000000b80)) 19:42:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000440)=""/245) 19:42:50 executing program 4: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 19:42:50 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) getpgrp(0xffffffffffffffff) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000400)={0x0, {{0x2, 0x0, @multicast1=0xe0000001}}, {{0x2}}}, 0x108) 19:42:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) getpid() flock(0xffffffffffffffff, 0x0) [ 831.270726] audit: type=1326 audit(1529696570.269:1822): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19869 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:50 executing program 7: add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f00000002c0), 0x0, 0xfffffffffffffffe) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f00000000c0)) 19:42:50 executing program 4: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 19:42:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000440)=""/245) 19:42:50 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) getpgrp(0xffffffffffffffff) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000400)={0x0, {{0x2, 0x0, @multicast1=0xe0000001}}, {{0x2}}}, 0x108) 19:42:50 executing program 7: add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f00000002c0), 0x0, 0xfffffffffffffffe) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f00000000c0)) 19:42:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) getpid() flock(0xffffffffffffffff, 0x0) 19:42:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) request_key(&(0x7f0000000080)='.request_key_auth\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000140)='posix_acl_access-)wlan0][]&vboxnet0\x00', 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000180)) 19:42:50 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fb}]}) syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000040)) [ 831.925483] audit: type=1326 audit(1529696570.924:1823): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19897 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:51 executing program 7: add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f00000002c0), 0x0, 0xfffffffffffffffe) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f00000000c0)) 19:42:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) getpid() flock(0xffffffffffffffff, 0x0) 19:42:51 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000440)=""/245) 19:42:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) recvmsg(0xffffffffffffff9c, &(0x7f00000005c0)={&(0x7f0000000380)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @rand_addr}}}, 0x80, &(0x7f0000000500), 0x0, &(0x7f0000000540)=""/115, 0x73}, 0x0) mount(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000a80)='./file0\x00', &(0x7f0000000a40)='ramfs\x00', 0x0, &(0x7f0000000b80)) 19:42:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 19:42:51 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) 19:42:51 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f00000002c0), 0x0, 0xfffffffffffffffe) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f00000000c0)) 19:42:51 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000440)=""/245) 19:42:51 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f00000002c0), 0x0, 0xfffffffffffffffe) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f00000000c0)) 19:42:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 19:42:51 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f00000002c0), 0x0, 0xfffffffffffffffe) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f00000000c0)) 19:42:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) getpgrp(0xffffffffffffffff) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000400)={0x0, {{0x2, 0x0, @multicast1=0xe0000001}}, {{0x2}}}, 0x108) 19:42:51 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) 19:42:51 executing program 0: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000440)=""/245) 19:42:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) request_key(&(0x7f0000000080)='.request_key_auth\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000140)='posix_acl_access-)wlan0][]&vboxnet0\x00', 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000180)) 19:42:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 19:42:51 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f00000002c0), 0x0, 0xfffffffffffffffe) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f00000000c0)) [ 832.871162] kauditd_printk_skb: 3 callbacks suppressed [ 832.871186] audit: type=1326 audit(1529696571.869:1827): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19953 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 832.949964] audit: type=1326 audit(1529696571.948:1828): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19958 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) getpid() flock(0xffffffffffffffff, 0x0) 19:42:52 executing program 0: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000440)=""/245) [ 833.130896] audit: type=1326 audit(1529696572.129:1829): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19972 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:52 executing program 0: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000440)=""/245) 19:42:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) 19:42:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 19:42:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f00000002c0), 0x0, 0xfffffffffffffffe) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f00000000c0)) 19:42:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000500)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 19:42:52 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000440)=""/245) 19:42:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f00000002c0), 0x0, 0xfffffffffffffffe) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f00000000c0)) 19:42:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 19:42:52 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) getpgrp(0xffffffffffffffff) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000400)={0x0, {{0x2, 0x0, @multicast1=0xe0000001}}, {{0x2}}}, 0x108) 19:42:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) 19:42:52 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000440)=""/245) [ 833.802055] audit: type=1326 audit(1529696572.800:1830): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20008 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:52 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000440)=""/245) 19:42:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f00000002c0), 0x0, 0xfffffffffffffffe) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f00000000c0)) 19:42:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 19:42:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) getpid() flock(0xffffffffffffffff, 0x0) 19:42:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000500)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 19:42:53 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000080)) 19:42:53 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 19:42:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) 19:42:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000440)=""/245) 19:42:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f00000002c0), 0x0, 0xfffffffffffffffe) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f00000000c0)) [ 834.085706] audit: type=1326 audit(1529696573.084:1831): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20025 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f00000002c0), 0x0, 0xfffffffffffffffe) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f00000000c0)) 19:42:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000440)=""/245) [ 834.175448] audit: type=1326 audit(1529696573.142:1832): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20036 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000500)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 19:42:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000500)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 19:42:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) 19:42:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000440)=""/245) 19:42:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00'}, 0x10) 19:42:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f00000002c0), 0x0, 0xfffffffffffffffe) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f00000000c0)) 19:42:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000080)={{0x2, 0x0, @rand_addr}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @loopback=0x7f000001}, 'veth1\x00'}) [ 834.765193] audit: type=1326 audit(1529696573.763:1833): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20054 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:54 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)) 19:42:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000440)=""/245) 19:42:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000500)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 19:42:54 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) getpid() getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/57, &(0x7f0000000100)=0x39) 19:42:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) 19:42:54 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 19:42:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000000)={'bridge0\x00'}) 19:42:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000440)=""/245) [ 835.258536] audit: type=1326 audit(1529696574.257:1834): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20078 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:54 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)) 19:42:54 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) 19:42:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000500)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 19:42:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000000)={'bridge0\x00'}) 19:42:54 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) getpid() getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/57, &(0x7f0000000100)=0x39) 19:42:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000440)=""/245) 19:42:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f00000002c0), 0x0, 0xfffffffffffffffe) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f00000000c0)) 19:42:54 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) 19:42:54 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)) 19:42:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000500)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 19:42:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000440)=""/245) 19:42:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000000)={'bridge0\x00'}) 19:42:54 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) getpid() getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/57, &(0x7f0000000100)=0x39) [ 835.804871] audit: type=1326 audit(1529696574.803:1835): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20126 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 835.893640] audit: type=1326 audit(1529696574.824:1836): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20130 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:55 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) 19:42:55 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 19:42:55 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000500)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 19:42:55 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) getpid() getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/57, &(0x7f0000000100)=0x39) 19:42:55 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)) 19:42:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000000)={'bridge0\x00'}) 19:42:55 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000500)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 19:42:55 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) 19:42:55 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/57, &(0x7f0000000100)=0x39) 19:42:55 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f00000002c0), 0x0, 0xfffffffffffffffe) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f00000000c0)) 19:42:55 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)) 19:42:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000000)={'bridge0\x00'}) 19:42:55 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000500)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 19:42:55 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) 19:42:55 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/57, &(0x7f0000000100)=0x39) 19:42:55 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000440)=""/245) 19:42:55 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) 19:42:56 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) 19:42:56 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/57, &(0x7f0000000100)=0x39) 19:42:56 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000500)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 19:42:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)) 19:42:56 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000000)={'bridge0\x00'}) 19:42:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) epoll_create1(0x0) 19:42:56 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000500)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 19:42:56 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) 19:42:56 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000440)=""/245) 19:42:56 executing program 3: getpid() getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/57, &(0x7f0000000100)=0x39) 19:42:56 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000000)={'bridge0\x00'}) 19:42:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)) 19:42:56 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000500)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 19:42:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) munlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 19:42:56 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) 19:42:56 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) inotify_init1(0x0) 19:42:56 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000500)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 19:42:56 executing program 3: getpid() getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/57, &(0x7f0000000100)=0x39) 19:42:56 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) 19:42:56 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)) 19:42:56 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000000)={'bridge0\x00'}) 19:42:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) munlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 19:42:57 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) inotify_init1(0x0) 19:42:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000500)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 19:42:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) munlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 19:42:57 executing program 3: getpid() getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/57, &(0x7f0000000100)=0x39) 19:42:57 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000000)={'bridge0\x00'}) 19:42:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) 19:42:57 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)) 19:42:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000500)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 19:42:57 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) inotify_init1(0x0) 19:42:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) 19:42:57 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)) 19:42:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000500)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 19:42:57 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) inotify_init1(0x0) 19:42:57 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000000)={'bridge0\x00'}) 19:42:57 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) getpid() getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/57, &(0x7f0000000100)=0x39) 19:42:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) 19:42:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) munlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 19:42:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) inotify_init1(0x0) 19:42:58 executing program 1: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)) 19:42:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) 19:42:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000500)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 19:42:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) 19:42:58 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000000)={'bridge0\x00'}) 19:42:58 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) getpid() getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/57, &(0x7f0000000100)=0x39) 19:42:58 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) munlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) [ 839.200787] kauditd_printk_skb: 4 callbacks suppressed [ 839.200811] audit: type=1326 audit(1529696578.199:1841): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20327 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:58 executing program 1: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)) 19:42:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) inotify_init1(0x0) 19:42:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000500)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 19:42:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) 19:42:58 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000000)={'bridge0\x00'}) 19:42:58 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) getpid() getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/57, &(0x7f0000000100)=0x39) 19:42:58 executing program 1: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)) 19:42:58 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) munlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 19:42:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000500)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 19:42:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) inotify_init1(0x0) 19:42:58 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000000)={'bridge0\x00'}) 19:42:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) [ 839.647292] audit: type=1326 audit(1529696578.646:1842): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20363 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:59 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) 19:42:59 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) getpid() getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/57, &(0x7f0000000100)=0x39) 19:42:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)) 19:42:59 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) munlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 19:42:59 executing program 7: getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) inotify_init1(0x0) 19:42:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000000)={'bridge0\x00'}) 19:42:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) [ 840.150652] audit: type=1326 audit(1529696579.149:1843): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20389 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:42:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000000)={'bridge0\x00'}) 19:42:59 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) getpid() getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/57, &(0x7f0000000100)=0x39) 19:42:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) 19:42:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)) 19:42:59 executing program 7: getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) inotify_init1(0x0) 19:42:59 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000500)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 19:42:59 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) munlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 19:42:59 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) getpid() getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/57, &(0x7f0000000100)=0x39) 19:42:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000000)={'bridge0\x00'}) [ 840.646683] audit: type=1326 audit(1529696579.645:1844): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20425 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:00 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) 19:43:00 executing program 7: getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) inotify_init1(0x0) 19:43:00 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)) 19:43:00 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) 19:43:00 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) getpid() getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/57, &(0x7f0000000100)=0x39) 19:43:00 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) munlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 19:43:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000000)={'bridge0\x00'}) [ 841.100425] audit: type=1326 audit(1529696580.099:1845): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20434 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:00 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) getpid() getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/57, &(0x7f0000000100)=0x39) 19:43:00 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) 19:43:00 executing program 7: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) inotify_init1(0x0) 19:43:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000000)={'bridge0\x00'}) 19:43:00 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)) 19:43:00 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000500)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 19:43:00 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) munlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 19:43:00 executing program 7: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) inotify_init1(0x0) 19:43:00 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) getpid() getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/57, &(0x7f0000000100)=0x39) [ 841.624517] audit: type=1326 audit(1529696580.623:1846): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20475 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:00 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) munlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 19:43:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000000)={'bridge0\x00'}) 19:43:00 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)) 19:43:00 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) 19:43:00 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) getpid() getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/57, &(0x7f0000000100)=0x39) 19:43:00 executing program 7: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) inotify_init1(0x0) 19:43:00 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50238}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) seccomp(0x0, 0x0, &(0x7f0000000040)) [ 842.019259] audit: type=1326 audit(1529696581.018:1847): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20484 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000000)={'bridge0\x00'}) 19:43:01 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) munlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 19:43:01 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)) 19:43:01 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) inotify_init1(0x0) 19:43:01 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) [ 842.235828] audit: type=1326 audit(1529696581.234:1848): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20503 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:01 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) munlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 19:43:01 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)) 19:43:01 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) inotify_init1(0x0) 19:43:01 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) 19:43:01 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50238}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) seccomp(0x0, 0x0, &(0x7f0000000040)) 19:43:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000040)='ip6gretap0\x00') [ 842.576700] audit: type=1326 audit(1529696581.575:1849): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20523 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:01 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) inotify_init1(0x0) 19:43:01 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) 19:43:01 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) getpid() getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/57, &(0x7f0000000100)=0x39) 19:43:01 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) munlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 19:43:01 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50238}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) seccomp(0x0, 0x0, &(0x7f0000000040)) [ 842.958535] audit: type=1326 audit(1529696581.957:1850): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20543 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000000)={'bridge0\x00'}) 19:43:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000040)='ip6gretap0\x00') 19:43:02 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) 19:43:02 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) inotify_init1(0x0) 19:43:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) munlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 19:43:02 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50238}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) seccomp(0x0, 0x0, &(0x7f0000000040)) 19:43:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) munlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 19:43:02 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) inotify_init1(0x0) 19:43:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)) 19:43:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) 19:43:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000040)='ip6gretap0\x00') 19:43:02 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50238}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) 19:43:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) munlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 19:43:02 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) getpid() getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/57, &(0x7f0000000100)=0x39) 19:43:02 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) inotify_init1(0x0) 19:43:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) 19:43:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000000)={'bridge0\x00'}) 19:43:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) munlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 19:43:03 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50238}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) 19:43:03 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000040)='ip6gretap0\x00') 19:43:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) 19:43:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) inotify_init1(0x0) 19:43:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) munlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 19:43:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) 19:43:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)) 19:43:03 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50238}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) 19:43:03 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000040)='ip6gretap0\x00') 19:43:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) 19:43:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) munlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) [ 844.449530] kauditd_printk_skb: 5 callbacks suppressed [ 844.449551] audit: type=1326 audit(1529696583.448:1856): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20628 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 844.502430] audit: type=1326 audit(1529696583.495:1857): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20636 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:03 executing program 6: socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) seccomp(0x0, 0x0, &(0x7f0000000040)) 19:43:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) 19:43:03 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000040)='ip6gretap0\x00') 19:43:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) inotify_init1(0x0) 19:43:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)) 19:43:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) 19:43:04 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000040)='ip6gretap0\x00') 19:43:04 executing program 6: socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) seccomp(0x0, 0x0, &(0x7f0000000040)) 19:43:04 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140), 0xc) [ 845.085367] audit: type=1326 audit(1529696584.084:1858): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20658 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:04 executing program 6: socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) seccomp(0x0, 0x0, &(0x7f0000000040)) 19:43:04 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000040)='ip6gretap0\x00') [ 845.194519] audit: type=1326 audit(1529696584.130:1859): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20657 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:04 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50238}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) seccomp(0x0, 0x0, &(0x7f0000000040)) 19:43:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)) 19:43:04 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000040)='ip6gretap0\x00') 19:43:04 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140), 0xc) 19:43:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) munlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 19:43:04 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000100)={{0x0, @broadcast=0xffffffff, 0x0, 0x0, 'sed\x00'}, {@rand_addr}}, 0x44) [ 845.495290] audit: type=1326 audit(1529696584.492:1860): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20691 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:04 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000040)='ip6gretap0\x00') 19:43:04 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50238}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) seccomp(0x0, 0x0, &(0x7f0000000040)) 19:43:05 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000100)={{0x0, @broadcast=0xffffffff, 0x0, 0x0, 'sed\x00'}, {@rand_addr}}, 0x44) 19:43:05 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) 19:43:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)) 19:43:05 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50238}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) seccomp(0x0, 0x0, &(0x7f0000000040)) 19:43:05 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) inotify_init1(0x0) 19:43:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140), 0xc) 19:43:05 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000040)='ip6gretap0\x00') 19:43:05 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000040)='ip6gretap0\x00') [ 846.088800] audit: type=1326 audit(1529696585.087:1861): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20726 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:05 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000100)={{0x0, @broadcast=0xffffffff, 0x0, 0x0, 'sed\x00'}, {@rand_addr}}, 0x44) 19:43:05 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) seccomp(0x0, 0x0, &(0x7f0000000040)) [ 846.174170] audit: type=1326 audit(1529696585.115:1862): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20728 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140), 0xc) 19:43:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)) 19:43:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) munlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 19:43:05 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000040)='ip6gretap0\x00') 19:43:05 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) seccomp(0x0, 0x0, &(0x7f0000000040)) 19:43:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140), 0xc) 19:43:05 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000100)={{0x0, @broadcast=0xffffffff, 0x0, 0x0, 'sed\x00'}, {@rand_addr}}, 0x44) [ 846.483263] audit: type=1326 audit(1529696585.482:1863): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20753 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:05 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) 19:43:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)) 19:43:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000040)='ip6gretap0\x00') 19:43:05 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) seccomp(0x0, 0x0, &(0x7f0000000040)) 19:43:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140), 0xc) 19:43:05 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000100)={{0x0, @broadcast=0xffffffff, 0x0, 0x0, 'sed\x00'}, {@rand_addr}}, 0x44) 19:43:06 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) 19:43:06 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)) 19:43:06 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50238}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) seccomp(0x0, 0x0, &(0x7f0000000040)) [ 847.092803] audit: type=1326 audit(1529696586.091:1864): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20785 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140), 0xc) 19:43:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000040)='ip6gretap0\x00') 19:43:06 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140), 0xc) 19:43:06 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) 19:43:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000100)={{0x0, @broadcast=0xffffffff, 0x0, 0x0, 'sed\x00'}, {@rand_addr}}, 0x44) 19:43:06 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50238}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) seccomp(0x0, 0x0, &(0x7f0000000040)) 19:43:06 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)) 19:43:06 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) 19:43:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000100)={{0x0, @broadcast=0xffffffff, 0x0, 0x0, 'sed\x00'}, {@rand_addr}}, 0x44) 19:43:06 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140), 0xc) 19:43:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) 19:43:06 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50238}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) seccomp(0x0, 0x0, &(0x7f0000000040)) 19:43:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000040)='ip6gretap0\x00') 19:43:06 executing program 3: socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)) 19:43:06 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080), 0x10) 19:43:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000040)='ip6gretap0\x00') 19:43:07 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140), 0xc) 19:43:07 executing program 3: socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)) 19:43:07 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) seccomp(0x0, 0x0, &(0x7f0000000040)) 19:43:07 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) 19:43:07 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000100)={{0x0, @broadcast=0xffffffff, 0x0, 0x0, 'sed\x00'}, {@rand_addr}}, 0x44) 19:43:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) [ 848.249538] audit: type=1326 audit(1529696587.248:1865): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20856 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000040)='ip6gretap0\x00') 19:43:07 executing program 3: socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)) 19:43:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080), 0x10) 19:43:07 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140), 0xc) 19:43:07 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000100)={{0x0, @broadcast=0xffffffff, 0x0, 0x0, 'sed\x00'}, {@rand_addr}}, 0x44) 19:43:07 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) 19:43:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) 19:43:07 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140), 0xc) 19:43:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000040)='ip6gretap0\x00') 19:43:07 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)) 19:43:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080), 0x10) 19:43:07 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000100)={{0x0, @broadcast=0xffffffff, 0x0, 0x0, 'sed\x00'}, {@rand_addr}}, 0x44) 19:43:08 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) seccomp(0x0, 0x0, &(0x7f0000000040)) 19:43:08 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) 19:43:08 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140), 0xc) 19:43:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000040)='ip6gretap0\x00') 19:43:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) 19:43:08 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)) 19:43:08 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080), 0x10) 19:43:08 executing program 1: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000100)={{0x0, @broadcast=0xffffffff, 0x0, 0x0, 'sed\x00'}, {@rand_addr}}, 0x44) 19:43:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140), 0xc) 19:43:08 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)) 19:43:08 executing program 1: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000100)={{0x0, @broadcast=0xffffffff, 0x0, 0x0, 'sed\x00'}, {@rand_addr}}, 0x44) 19:43:08 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) 19:43:08 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080), 0x10) 19:43:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) 19:43:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140), 0xc) 19:43:08 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000006c0)}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)) 19:43:09 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) seccomp(0x0, 0x0, &(0x7f0000000040)) 19:43:09 executing program 1: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000100)={{0x0, @broadcast=0xffffffff, 0x0, 0x0, 'sed\x00'}, {@rand_addr}}, 0x44) 19:43:09 executing program 7: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) 19:43:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080), 0x10) 19:43:09 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) 19:43:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140), 0xc) 19:43:09 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000006c0)}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)) 19:43:09 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000040)='ip6gretap0\x00') [ 850.166361] kauditd_printk_skb: 2 callbacks suppressed [ 850.166386] audit: type=1326 audit(1529696589.164:1868): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20962 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000100)={{0x0, @broadcast=0xffffffff, 0x0, 0x0, 'sed\x00'}, {@rand_addr}}, 0x44) 19:43:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140), 0xc) 19:43:09 executing program 7: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) 19:43:09 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000006c0)}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)) [ 850.281634] audit: type=1326 audit(1529696589.239:1869): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20963 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080), 0x10) 19:43:09 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) 19:43:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000100)={{0x0, @broadcast=0xffffffff, 0x0, 0x0, 'sed\x00'}, {@rand_addr}}, 0x44) 19:43:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140), 0xc) 19:43:10 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000040)='ip6gretap0\x00') 19:43:10 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023d}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)) 19:43:10 executing program 7: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) 19:43:10 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) 19:43:10 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080), 0x10) 19:43:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140), 0xc) 19:43:10 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000100), 0x0) 19:43:10 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000100)={{0x0, @broadcast=0xffffffff, 0x0, 0x0, 'sed\x00'}, {@rand_addr}}, 0x44) 19:43:10 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000100)={{0x0, @broadcast=0xffffffff, 0x0, 0x0, 'sed\x00'}, {@rand_addr}}, 0x44) [ 851.119255] audit: type=1326 audit(1529696590.118:1870): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21019 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:10 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) 19:43:10 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) 19:43:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140), 0xc) 19:43:10 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080), 0x10) 19:43:10 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023d}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)) 19:43:10 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000100)={{0x0, @broadcast=0xffffffff, 0x0, 0x0, 'sed\x00'}, {@rand_addr}}, 0x44) [ 851.364728] audit: type=1326 audit(1529696590.363:1871): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21041 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:10 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) 19:43:11 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) 19:43:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000100), 0x0) 19:43:11 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) 19:43:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000100)={{0x0, @broadcast=0xffffffff, 0x0, 0x0, 'sed\x00'}, {@rand_addr}}, 0x44) 19:43:11 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023d}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)) 19:43:11 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080), 0x10) 19:43:11 executing program 5: 19:43:11 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) 19:43:11 executing program 5: 19:43:11 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) 19:43:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000100)={{0x0, @broadcast=0xffffffff, 0x0, 0x0, 'sed\x00'}, {@rand_addr}}, 0x44) 19:43:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140), 0xc) 19:43:11 executing program 0: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080), 0x10) 19:43:11 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)) 19:43:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000100), 0x0) [ 852.264586] audit: type=1326 audit(1529696591.263:1872): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21083 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:11 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) 19:43:11 executing program 5: [ 852.355029] audit: type=1326 audit(1529696591.353:1873): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21090 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:11 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) 19:43:11 executing program 0: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080), 0x10) [ 852.439220] audit: type=1326 audit(1529696591.416:1874): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21097 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000100), 0x0) 19:43:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) 19:43:11 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) 19:43:11 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000040)=0x14) 19:43:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) 19:43:11 executing program 0: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080), 0x10) 19:43:11 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) 19:43:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000100)={{0x0, @broadcast=0xffffffff, 0x0, 0x0, 'sed\x00'}, {@rand_addr}}, 0x44) [ 853.153923] audit: type=1326 audit(1529696592.152:1875): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21139 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140), 0xc) 19:43:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) 19:43:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000100), 0x0) 19:43:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket$inet_icmp_raw(0x2, 0x3, 0x1) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080), 0x10) 19:43:12 executing program 5: io_submit(0x0, 0x1fffffffffffff74, &(0x7f0000000040)) 19:43:12 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) 19:43:12 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)) [ 853.363804] audit: type=1326 audit(1529696592.362:1876): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21152 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) 19:43:12 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) 19:43:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket$inet_icmp_raw(0x2, 0x3, 0x1) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080), 0x10) [ 853.417617] audit: type=1326 audit(1529696592.391:1877): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21154 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000100), 0x0) 19:43:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50208}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 19:43:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) 19:43:12 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) 19:43:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket$inet_icmp_raw(0x2, 0x3, 0x1) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080), 0x10) 19:43:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000100)={{0x0, @broadcast=0xffffffff, 0x0, 0x0, 'sed\x00'}, {@rand_addr}}, 0x44) 19:43:13 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)) 19:43:13 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) 19:43:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000100), 0x0) 19:43:13 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000200)) 19:43:13 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) 19:43:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080), 0x10) 19:43:13 executing program 2: io_submit(0x0, 0x3, &(0x7f0000000700)=[&(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)="fd7bc8d5e749b786c7addc8a31fb32744952260a6ea5a1446dceaef141b7f92c5f2f6ba6661f4d3bd5319b90ae6a854896972280705e94cf5c545cb350d0409cb6ab962544ba726e0ebde827b221e402064c0b835d202c64e6d570365c9939412f6ff2a1acf713cd991f50affdf68cc948fed04e58e3a3730eeea256579cbdf7fb4c642d69e40dcbc5bc9de76a669613f1366dcb645c60c3e7598a4e71e7d22a92f6fbf0576e86c2a249b2c768c8c475941455c779508d73f7022960ced10003a6a3314c67b9dd30f942eefdb31cb7d4313fc3", 0xd3, 0xf54}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x8, 0x8000, 0xffffffffffffffff, &(0x7f0000000300)="4ed38b9c6e0a8c80d2e701fb8ed81f70b303a30b719c6e08030f5906cfee2cdd37f1", 0x22, 0x3, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x2, 0x7, 0xffffffffffffffff, &(0x7f0000000480)="734d411ceba8901d817cde2503b9e00152a861ae255b45e59f34badc22b79f9a32d9772d82fc3a8b4d8ca44744f79adb925349328f0d827f8562b54d6ee89e8a853e37201af26376a8de97d2aa8301a25eea600f0130642fc39b329b2eee5ea4c3f18da4d24a69870f24b6170974129a7be2a5e1de9ac397d5237222b36ff4cde0a66455d7b3bb58a38701d6f27faa2e4eaecc4ccb9257339ab1768048ad40df7fd7e53e2df480319d80a2bbc67f9e3b66674de1284004f21bd984312e6a370e4137500a1449c2d99a7cae10071c8b3ef309cf477451898ab1380db98b3582d856af3529475ff65726afc95451520a2d5e6e", 0xf2, 0x5}]) 19:43:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) socket$nl_generic(0x10, 0x3, 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:43:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080), 0x10) 19:43:13 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) 19:43:13 executing program 6: openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000100), 0x0) 19:43:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080), 0x10) 19:43:13 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}, 0x5c) 19:43:13 executing program 6: openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000100), 0x0) 19:43:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080), 0x10) 19:43:14 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}, 0x5c) 19:43:14 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}, 0x5c) 19:43:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) socket$nl_generic(0x10, 0x3, 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:43:14 executing program 6: openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000100), 0x0) 19:43:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'bridge0\x00', {0x2, 0x0, @multicast1=0xe0000001}}) 19:43:14 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) 19:43:14 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 19:43:14 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000100), 0x0) [ 855.335244] kauditd_printk_skb: 5 callbacks suppressed [ 855.335268] audit: type=1326 audit(1529696594.334:1883): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21260 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:14 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}, 0x5c) 19:43:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'bridge0\x00', {0x2, 0x0, @multicast1=0xe0000001}}) 19:43:14 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) 19:43:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) socket$nl_generic(0x10, 0x3, 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:43:14 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet(0x2, 0x0, 0x0) nanosleep(&(0x7f0000000280)={0x0, 0x1c9c380}, &(0x7f0000000300)) 19:43:14 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000100), 0x0) [ 855.599224] audit: type=1326 audit(1529696594.598:1884): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21279 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'bridge0\x00', {0x2, 0x0, @multicast1=0xe0000001}}) 19:43:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080), 0x10) 19:43:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) socket$nl_generic(0x10, 0x3, 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:43:14 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000100), 0x0) 19:43:14 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}, 0x5c) [ 855.770799] audit: type=1326 audit(1529696594.769:1885): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21293 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'bridge0\x00', {0x2, 0x0, @multicast1=0xe0000001}}) 19:43:14 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet(0x2, 0x0, 0x0) nanosleep(&(0x7f0000000280)={0x0, 0x1c9c380}, &(0x7f0000000300)) 19:43:15 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) 19:43:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:43:15 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000100), 0x0) 19:43:15 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}, 0x5c) 19:43:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'bridge0\x00', {0x2, 0x0, @multicast1=0xe0000001}}) [ 856.282561] audit: type=1326 audit(1529696595.281:1886): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21324 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:15 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) 19:43:15 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet(0x2, 0x0, 0x0) nanosleep(&(0x7f0000000280)={0x0, 0x1c9c380}, &(0x7f0000000300)) 19:43:15 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000100), 0x0) 19:43:15 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}, 0x5c) 19:43:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 856.545942] audit: type=1326 audit(1529696595.544:1887): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21340 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:15 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080), 0x10) 19:43:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'bridge0\x00', {0x2, 0x0, @multicast1=0xe0000001}}) 19:43:15 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000100), 0x0) 19:43:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:43:15 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}, 0x5c) 19:43:15 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet(0x2, 0x0, 0x0) nanosleep(&(0x7f0000000280)={0x0, 0x1c9c380}, &(0x7f0000000300)) [ 856.740958] audit: type=1326 audit(1529696595.739:1888): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21356 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) nanosleep(&(0x7f0000000280)={0x0, 0x1c9c380}, &(0x7f0000000300)) 19:43:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000100), 0x0) 19:43:16 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}, 0x5c) 19:43:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'bridge0\x00', {0x2, 0x0, @multicast1=0xe0000001}}) 19:43:16 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:43:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000100), 0x0) 19:43:16 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KDSKBSENT(r1, 0x4b49, &(0x7f00000000c0)) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000440)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r1, 0xc08c5334, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue0\x00'}) 19:43:16 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:43:16 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}, 0x5c) 19:43:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) nanosleep(&(0x7f0000000280)={0x0, 0x1c9c380}, &(0x7f0000000300)) 19:43:16 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:43:16 executing program 1: ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'bridge0\x00', {0x2, 0x0, @multicast1=0xe0000001}}) 19:43:16 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000100)) 19:43:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000100), 0x0) 19:43:16 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) io_submit(0x0, 0x0, &(0x7f0000000180)) 19:43:16 executing program 5: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}, 0x5c) 19:43:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) nanosleep(&(0x7f0000000280)={0x0, 0x1c9c380}, &(0x7f0000000300)) 19:43:16 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)) setpgid(0x0, 0x0) 19:43:16 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) socket$nl_generic(0x10, 0x3, 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:43:16 executing program 5: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}, 0x5c) 19:43:16 executing program 1: ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'bridge0\x00', {0x2, 0x0, @multicast1=0xe0000001}}) 19:43:16 executing program 3: socket$inet(0x2, 0x0, 0x0) nanosleep(&(0x7f0000000280)={0x0, 0x1c9c380}, &(0x7f0000000300)) 19:43:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000100), 0x0) 19:43:16 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) io_submit(0x0, 0x0, &(0x7f0000000180)) [ 857.921398] audit: type=1326 audit(1529696596.920:1889): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21434 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:17 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) socket$nl_generic(0x10, 0x3, 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:43:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)) setpgid(0x0, 0x0) 19:43:17 executing program 1: ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'bridge0\x00', {0x2, 0x0, @multicast1=0xe0000001}}) 19:43:17 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000100)) 19:43:17 executing program 5: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}, 0x5c) 19:43:17 executing program 3: socket$inet(0x2, 0x0, 0x0) nanosleep(&(0x7f0000000280)={0x0, 0x1c9c380}, &(0x7f0000000300)) 19:43:17 executing program 7: io_submit(0x0, 0x1ffffffffffffe6d, &(0x7f0000000040)) 19:43:17 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) socket$nl_generic(0x10, 0x3, 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:43:17 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'bridge0\x00', {0x2, 0x0, @multicast1=0xe0000001}}) 19:43:17 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}, 0x5c) 19:43:17 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000100)) 19:43:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)) setpgid(0x0, 0x0) 19:43:17 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50249}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f0000000700), 0x0, 0xfffffffffffffffc) 19:43:17 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'bridge0\x00', {0x2, 0x0, @multicast1=0xe0000001}}) 19:43:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000100), 0x0) 19:43:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000006c0)}) socket$nl_generic(0x10, 0x3, 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:43:17 executing program 3: socket$inet(0x2, 0x0, 0x0) nanosleep(&(0x7f0000000280)={0x0, 0x1c9c380}, &(0x7f0000000300)) 19:43:17 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}, 0x5c) 19:43:17 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000100)) 19:43:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)) setpgid(0x0, 0x0) 19:43:17 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'bridge0\x00', {0x2, 0x0, @multicast1=0xe0000001}}) 19:43:17 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50249}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f0000000700), 0x0, 0xfffffffffffffffc) [ 858.892121] audit: type=1326 audit(1529696597.890:1890): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21509 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:17 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}, 0x5c) 19:43:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000006c0)}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'bridge0\x00', {0x2, 0x0, @multicast1=0xe0000001}}) 19:43:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000006c0)}) socket$nl_generic(0x10, 0x3, 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:43:18 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000100)) 19:43:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50249}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f0000000700), 0x0, 0xfffffffffffffffc) 19:43:18 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet(0x2, 0x0, 0x0) nanosleep(&(0x7f0000000280)={0x0, 0x1c9c380}, &(0x7f0000000300)) 19:43:18 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) setpgid(0x0, 0x0) 19:43:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000006c0)}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'bridge0\x00', {0x2, 0x0, @multicast1=0xe0000001}}) 19:43:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000100), 0x0) 19:43:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}, 0x5c) 19:43:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000006c0)}) socket$nl_generic(0x10, 0x3, 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:43:18 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000100)) 19:43:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000006c0)}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'bridge0\x00', {0x2, 0x0, @multicast1=0xe0000001}}) 19:43:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50249}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f0000000700), 0x0, 0xfffffffffffffffc) 19:43:18 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) setpgid(0x0, 0x0) 19:43:18 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet(0x2, 0x0, 0x0) nanosleep(&(0x7f0000000280)={0x0, 0x1c9c380}, &(0x7f0000000300)) [ 859.877635] audit: type=1326 audit(1529696598.876:1891): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21562 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023d}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'bridge0\x00', {0x2, 0x0, @multicast1=0xe0000001}}) 19:43:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023d}]}) socket$nl_generic(0x10, 0x3, 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:43:18 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000100)) 19:43:19 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}, 0x5c) 19:43:19 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) setpgid(0x0, 0x0) 19:43:19 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50249}]}) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f0000000700), 0x0, 0xfffffffffffffffc) 19:43:19 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet(0x2, 0x0, 0x0) nanosleep(&(0x7f0000000280)={0x0, 0x1c9c380}, &(0x7f0000000300)) 19:43:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023d}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'bridge0\x00', {0x2, 0x0, @multicast1=0xe0000001}}) 19:43:19 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket$inet(0x2, 0x0, 0x0) nanosleep(&(0x7f0000000280)={0x0, 0x1c9c380}, &(0x7f0000000300)) 19:43:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023d}]}) socket$nl_generic(0x10, 0x3, 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:43:19 executing program 0: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)) setpgid(0x0, 0x0) 19:43:19 executing program 4: get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000100)) 19:43:19 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50249}]}) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f0000000700), 0x0, 0xfffffffffffffffc) 19:43:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023d}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'bridge0\x00', {0x2, 0x0, @multicast1=0xe0000001}}) 19:43:19 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}, 0x5c) 19:43:19 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f0000000100)) 19:43:19 executing program 0: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)) setpgid(0x0, 0x0) 19:43:19 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}, 0x5c) 19:43:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023d}]}) socket$nl_generic(0x10, 0x3, 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:43:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'bridge0\x00', {0x2, 0x0, @multicast1=0xe0000001}}) 19:43:19 executing program 4: get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000100)) 19:43:20 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50249}]}) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f0000000700), 0x0, 0xfffffffffffffffc) [ 861.019539] audit: type=1326 audit(1529696600.012:1892): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21624 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket$inet(0x2, 0x0, 0x0) nanosleep(&(0x7f0000000280)={0x0, 0x1c9c380}, &(0x7f0000000300)) 19:43:20 executing program 0: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)) setpgid(0x0, 0x0) [ 861.097734] audit: type=1326 audit(1529696600.066:1893): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21629 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket$nl_generic(0x10, 0x3, 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:43:20 executing program 4: get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000100)) 19:43:20 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f0000000100)) [ 861.240410] audit: type=1326 audit(1529696600.239:1894): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21646 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:20 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f0000000700), 0x0, 0xfffffffffffffffc) 19:43:20 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)) setpgid(0x0, 0x0) 19:43:20 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000100)) 19:43:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket$inet(0x2, 0x0, 0x0) nanosleep(&(0x7f0000000280)={0x0, 0x1c9c380}, &(0x7f0000000300)) 19:43:20 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)) setpgid(0x0, 0x0) 19:43:20 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f0000000700), 0x0, 0xfffffffffffffffc) 19:43:20 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}, 0x5c) 19:43:20 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f0000000100)) 19:43:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'bridge0\x00', {0x2, 0x0, @multicast1=0xe0000001}}) 19:43:20 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000100)) 19:43:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) socket$inet(0x2, 0x0, 0x0) nanosleep(&(0x7f0000000280)={0x0, 0x1c9c380}, &(0x7f0000000300)) 19:43:20 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)) setpgid(0x0, 0x0) 19:43:20 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f0000000700), 0x0, 0xfffffffffffffffc) [ 861.925620] audit: type=1326 audit(1529696600.924:1895): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21683 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 862.065257] audit: type=1326 audit(1529696601.063:1896): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21696 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket$nl_generic(0x10, 0x3, 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:43:21 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f0000000100)) 19:43:21 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)) setpgid(0x0, 0x0) 19:43:21 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000100)) 19:43:21 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50249}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f0000000700), 0x0, 0xfffffffffffffffc) 19:43:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) socket$inet(0x2, 0x0, 0x0) nanosleep(&(0x7f0000000280)={0x0, 0x1c9c380}, &(0x7f0000000300)) [ 862.233807] audit: type=1326 audit(1529696601.232:1897): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21708 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:21 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000100)) 19:43:21 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)) setpgid(0x0, 0x0) 19:43:21 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50249}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f0000000700), 0x0, 0xfffffffffffffffc) 19:43:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}, 0x5c) 19:43:21 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f0000000100)) [ 862.857639] audit: type=1326 audit(1529696601.856:1898): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21735 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'bridge0\x00', {0x2, 0x0, @multicast1=0xe0000001}}) 19:43:21 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000100)) 19:43:21 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)) setpgid(0x0, 0x0) 19:43:21 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50249}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f0000000700), 0x0, 0xfffffffffffffffc) 19:43:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) socket$inet(0x2, 0x0, 0x0) nanosleep(&(0x7f0000000280)={0x0, 0x1c9c380}, &(0x7f0000000300)) [ 863.023038] audit: type=1326 audit(1529696602.021:1899): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21751 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket$nl_generic(0x10, 0x3, 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:43:22 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f0000000100)) 19:43:22 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000100)) 19:43:22 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)) setpgid(0x0, 0x0) 19:43:22 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f0000000700), 0x0, 0xfffffffffffffffc) 19:43:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) nanosleep(&(0x7f0000000280)={0x0, 0x1c9c380}, &(0x7f0000000300)) [ 863.224827] audit: type=1326 audit(1529696602.223:1900): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21768 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:22 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f0000000700), 0x0, 0xfffffffffffffffc) 19:43:22 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)) setpgid(0x0, 0x0) 19:43:22 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f0000000100)) [ 863.339563] audit: type=1326 audit(1529696602.338:1901): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21769 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:22 executing program 6: get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f0000000100)) 19:43:22 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000100)) 19:43:22 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f0000000700), 0x0, 0xfffffffffffffffc) 19:43:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) socket(0x0, 0x0, 0x0) 19:43:22 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)) setpgid(0x0, 0x0) 19:43:22 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000100)) 19:43:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000000)) 19:43:23 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)) setpgid(0x0, 0x0) 19:43:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50249}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f0000000700), 0x0, 0xfffffffffffffffc) 19:43:23 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000100)) 19:43:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000000)) 19:43:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) nanosleep(&(0x7f0000000280)={0x0, 0x1c9c380}, &(0x7f0000000300)) 19:43:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) socket(0x0, 0x0, 0x0) 19:43:23 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000100)) 19:43:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50249}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f0000000700), 0x0, 0xfffffffffffffffc) 19:43:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000000)) 19:43:23 executing program 6: get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f0000000100)) 19:43:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50249}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f0000000700), 0x0, 0xfffffffffffffffc) 19:43:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) socket(0x0, 0x0, 0x0) 19:43:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000000)) 19:43:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f0000000700), 0x0, 0xfffffffffffffffc) 19:43:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000000)) 19:43:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) socket(0x0, 0x0, 0x0) 19:43:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)) setpgid(0x0, 0x0) 19:43:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000000)) 19:43:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socket(0x0, 0x0, 0x0) 19:43:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) nanosleep(&(0x7f0000000280)={0x0, 0x1c9c380}, &(0x7f0000000300)) 19:43:24 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000100)) 19:43:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000000)) 19:43:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socket(0x0, 0x0, 0x0) 19:43:24 executing program 6: get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f0000000100)) 19:43:24 executing program 1: ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000000)) 19:43:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socket(0x0, 0x0, 0x0) 19:43:24 executing program 1: ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000000)) 19:43:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f0000000700), 0x0, 0xfffffffffffffffc) 19:43:24 executing program 5: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) socket(0x0, 0x0, 0x0) 19:43:24 executing program 1: ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000000)) 19:43:24 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000000)) 19:43:24 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000000)) 19:43:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)) setpgid(0x0, 0x0) 19:43:25 executing program 5: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) socket(0x0, 0x0, 0x0) 19:43:25 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000000)) [ 866.217097] kauditd_printk_skb: 8 callbacks suppressed [ 866.217122] audit: type=1326 audit(1529696605.215:1910): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21922 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:25 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000100)) 19:43:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000006c0)}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000000)) 19:43:25 executing program 5: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) socket(0x0, 0x0, 0x0) 19:43:25 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f0000000100)) [ 866.414149] audit: type=1326 audit(1529696605.412:1911): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21928 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x14, 0x0) 19:43:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) sched_setparam(0x0, &(0x7f00000000c0)) 19:43:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000006c0)}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000000)) 19:43:25 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) socket(0x0, 0x0, 0x0) 19:43:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f0000000700), 0x0, 0xfffffffffffffffc) 19:43:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) sched_setparam(0x0, &(0x7f00000000c0)) 19:43:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000006c0)}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000000)) 19:43:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x14, 0x0) [ 866.785133] audit: type=1326 audit(1529696605.783:1912): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21953 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:25 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) socket(0x0, 0x0, 0x0) 19:43:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) sched_setparam(0x0, &(0x7f00000000c0)) 19:43:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023d}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000000)) 19:43:26 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) socket(0x0, 0x0, 0x0) 19:43:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023d}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000000)) 19:43:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x14, 0x0) 19:43:26 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000180)) 19:43:26 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f0000000100)) 19:43:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) socket(0x0, 0x0, 0x0) 19:43:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) sched_setparam(0x0, &(0x7f00000000c0)) 19:43:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) 19:43:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023d}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000000)) 19:43:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) 19:43:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) socket(0x0, 0x0, 0x0) 19:43:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x14, 0x0) 19:43:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) sched_setparam(0x0, &(0x7f00000000c0)) 19:43:26 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000180)) 19:43:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000000)) 19:43:26 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280), 0x2ed) [ 867.719481] audit: type=1326 audit(1529696606.717:1913): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22014 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) socket(0x0, 0x0, 0x0) 19:43:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) sched_setparam(0x0, &(0x7f00000000c0)) 19:43:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) 19:43:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x14, 0x0) 19:43:27 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f0000000100)) 19:43:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000180)) 19:43:27 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280), 0x2ed) 19:43:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) socket(0x0, 0x0, 0x0) 19:43:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) sched_setparam(0x0, &(0x7f00000000c0)) 19:43:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) 19:43:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x14, 0x0) 19:43:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) socket(0x0, 0x0, 0x0) 19:43:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x14, 0x0) 19:43:27 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) sched_setparam(0x0, &(0x7f00000000c0)) 19:43:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000180)) 19:43:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000000)) 19:43:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) socket(0x0, 0x0, 0x0) 19:43:27 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280), 0x2ed) 19:43:27 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) sched_setparam(0x0, &(0x7f00000000c0)) 19:43:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) [ 868.692052] audit: type=1326 audit(1529696607.690:1914): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22094 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:28 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f0000000100)) 19:43:28 executing program 2: ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x14, 0x0) 19:43:28 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) sched_setparam(0x0, &(0x7f00000000c0)) 19:43:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) socket(0x0, 0x0, 0x0) 19:43:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) 19:43:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000180)) 19:43:28 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280), 0x2ed) [ 869.054834] audit: type=1326 audit(1529696608.053:1915): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22102 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:28 executing program 2: ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x14, 0x0) 19:43:28 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) sched_setparam(0x0, &(0x7f00000000c0)) 19:43:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) 19:43:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000180)) 19:43:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000000)) 19:43:28 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280), 0x2ed) 19:43:28 executing program 2: ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x14, 0x0) 19:43:28 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) sched_setparam(0x0, &(0x7f00000000c0)) 19:43:28 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) [ 869.657703] audit: type=1326 audit(1529696608.656:1916): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22143 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:28 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f0000000100)) 19:43:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000180)) 19:43:28 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x14, 0x0) 19:43:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) socket(0x0, 0x0, 0x0) 19:43:28 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) sched_setparam(0x0, &(0x7f00000000c0)) 19:43:28 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) 19:43:28 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280), 0x2ed) 19:43:28 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x14, 0x0) 19:43:29 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) 19:43:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) sched_setparam(0x0, &(0x7f00000000c0)) 19:43:29 executing program 0: socket$inet6(0xa, 0x0, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000180)) [ 870.066513] audit: type=1326 audit(1529696609.065:1917): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22168 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:29 executing program 0: socket$inet6(0xa, 0x0, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000180)) 19:43:29 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x14, 0x0) 19:43:29 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280), 0x2ed) 19:43:29 executing program 4: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) 19:43:29 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000440)={0x0, {{0x2, 0x0, @broadcast=0xffffffff}}}, 0x88) 19:43:29 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f0000000100)) 19:43:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) sched_setparam(0x0, &(0x7f00000000c0)) 19:43:29 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000006c0)}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x14, 0x0) 19:43:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) socket(0x0, 0x0, 0x0) 19:43:29 executing program 4: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) 19:43:29 executing program 7: openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280), 0x2ed) 19:43:29 executing program 0: socket$inet6(0xa, 0x0, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000180)) 19:43:29 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000440)={0x0, {{0x2, 0x0, @broadcast=0xffffffff}}}, 0x88) 19:43:29 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000006c0)}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x14, 0x0) 19:43:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) sched_setparam(0x0, &(0x7f00000000c0)) 19:43:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) sched_setparam(0x0, &(0x7f00000000c0)) [ 871.048432] audit: type=1326 audit(1529696610.041:1918): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22219 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:30 executing program 4: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) 19:43:30 executing program 7: openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280), 0x2ed) 19:43:30 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000006c0)}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x14, 0x0) 19:43:30 executing program 0: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000180)) 19:43:30 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000440)={0x0, {{0x2, 0x0, @broadcast=0xffffffff}}}, 0x88) 19:43:30 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f0000000100)) 19:43:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) sched_setparam(0x0, &(0x7f00000000c0)) 19:43:30 executing program 7: openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280), 0x2ed) 19:43:30 executing program 0: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000180)) 19:43:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) 19:43:30 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023d}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x14, 0x0) 19:43:30 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000440)={0x0, {{0x2, 0x0, @broadcast=0xffffffff}}}, 0x88) 19:43:30 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280), 0x2ed) 19:43:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) creat(&(0x7f00000000c0)='./file0/file0\x00', 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 19:43:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) sched_setparam(0x0, &(0x7f00000000c0)) 19:43:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) 19:43:31 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280), 0x2ed) 19:43:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) sched_setparam(0x0, &(0x7f00000000c0)) 19:43:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023d}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x14, 0x0) 19:43:31 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000440)={0x0, {{0x2, 0x0, @broadcast=0xffffffff}}}, 0x88) [ 872.185591] audit: type=1326 audit(1529696611.184:1919): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22296 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) creat(&(0x7f00000000c0)='./file0/file0\x00', 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 19:43:31 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f0000000100)) 19:43:31 executing program 0: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000180)) 19:43:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) 19:43:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023d}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x14, 0x0) 19:43:31 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280), 0x2ed) 19:43:31 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000440)={0x0, {{0x2, 0x0, @broadcast=0xffffffff}}}, 0x88) 19:43:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) creat(&(0x7f00000000c0)='./file0/file0\x00', 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 19:43:31 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280), 0x2ed) 19:43:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) 19:43:31 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000440)={0x0, {{0x2, 0x0, @broadcast=0xffffffff}}}, 0x88) 19:43:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x14, 0x0) 19:43:31 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket$inet6(0xa, 0x0, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000180)) [ 872.703343] audit: type=1326 audit(1529696611.702:1920): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22337 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:32 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) sched_setparam(0x0, &(0x7f00000000c0)) 19:43:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) creat(&(0x7f00000000c0)='./file0/file0\x00', 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 19:43:32 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280), 0x2ed) 19:43:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) [ 873.121146] audit: type=1326 audit(1529696612.119:1921): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22358 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:32 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f0000000100)) 19:43:32 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280), 0x2ed) 19:43:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) 19:43:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 19:43:32 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket$inet6(0xa, 0x0, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000180)) 19:43:32 executing program 1: get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000440)={0x0, {{0x2, 0x0, @broadcast=0xffffffff}}}, 0x88) 19:43:32 executing program 1: get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000440)={0x0, {{0x2, 0x0, @broadcast=0xffffffff}}}, 0x88) 19:43:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) 19:43:32 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280), 0x2ed) 19:43:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) [ 873.559228] audit: type=1326 audit(1529696612.557:1922): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22388 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x14, 0x0) 19:43:32 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket$inet6(0xa, 0x0, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000180)) [ 873.694678] audit: type=1326 audit(1529696612.693:1923): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22395 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:33 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) sched_setparam(0x0, &(0x7f00000000c0)) 19:43:33 executing program 1: get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000440)={0x0, {{0x2, 0x0, @broadcast=0xffffffff}}}, 0x88) 19:43:33 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280), 0x2ed) 19:43:33 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 19:43:33 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000180)) [ 874.045177] audit: type=1326 audit(1529696613.043:1924): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22406 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:33 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f0000000100)) 19:43:33 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000440)={0x0, {{0x2, 0x0, @broadcast=0xffffffff}}}, 0x88) 19:43:33 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000180)) 19:43:33 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280), 0x2ed) 19:43:33 executing program 5: creat(&(0x7f00000000c0)='./file0/file0\x00', 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 19:43:33 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280), 0x2ed) [ 874.293552] audit: type=1326 audit(1529696613.292:1925): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22432 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 874.368693] audit: type=1326 audit(1529696613.367:1926): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22438 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) 19:43:33 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000440)={0x0, {{0x2, 0x0, @broadcast=0xffffffff}}}, 0x88) 19:43:33 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000180)) [ 874.495195] audit: type=1326 audit(1529696613.493:1927): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22447 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x14, 0x0) 19:43:33 executing program 5: creat(&(0x7f00000000c0)='./file0/file0\x00', 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) [ 874.625196] audit: type=1326 audit(1529696613.623:1928): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22456 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:33 executing program 5: creat(&(0x7f00000000c0)='./file0/file0\x00', 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 19:43:33 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000440)={0x0, {{0x2, 0x0, @broadcast=0xffffffff}}}, 0x88) 19:43:33 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000180)) 19:43:33 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) syz_open_pts(0xffffffffffffffff, 0x0) ustat(0x0, &(0x7f0000000000)) 19:43:34 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000440)={0x0, {{0x2, 0x0, @broadcast=0xffffffff}}}, 0x88) 19:43:34 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f0000000100)) 19:43:34 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) creat(&(0x7f00000000c0)='./file0/file0\x00', 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 19:43:34 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000440)={0x0, {{0x2, 0x0, @broadcast=0xffffffff}}}, 0x88) 19:43:34 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) syz_open_pts(0xffffffffffffffff, 0x0) ustat(0x0, &(0x7f0000000000)) 19:43:34 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280), 0x2ed) 19:43:34 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) creat(&(0x7f00000000c0)='./file0/file0\x00', 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 19:43:34 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) 19:43:34 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) syz_open_pts(0xffffffffffffffff, 0x0) ustat(0x0, &(0x7f0000000000)) 19:43:34 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000440)={0x0, {{0x2, 0x0, @broadcast=0xffffffff}}}, 0x88) 19:43:34 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000440)={0x0, {{0x2, 0x0, @broadcast=0xffffffff}}}, 0x88) 19:43:34 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) creat(&(0x7f00000000c0)='./file0/file0\x00', 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 19:43:34 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 19:43:34 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) syz_open_pts(0xffffffffffffffff, 0x0) ustat(0x0, &(0x7f0000000000)) 19:43:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000180)) 19:43:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) creat(&(0x7f00000000c0)='./file0/file0\x00', 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 19:43:34 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000440)={0x0, {{0x2, 0x0, @broadcast=0xffffffff}}}, 0x88) 19:43:35 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f0000000100)) 19:43:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 19:43:35 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ustat(0x0, &(0x7f0000000000)) 19:43:35 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000440)={0x0, {{0x2, 0x0, @broadcast=0xffffffff}}}, 0x88) 19:43:35 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280), 0x2ed) 19:43:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) creat(&(0x7f00000000c0)='./file0/file0\x00', 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 19:43:35 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000440)={0x0, {{0x2, 0x0, @broadcast=0xffffffff}}}, 0x88) 19:43:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) creat(&(0x7f00000000c0)='./file0/file0\x00', 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 19:43:35 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ustat(0x0, &(0x7f0000000000)) 19:43:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 19:43:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f00000000c0)}) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000180)) 19:43:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) creat(&(0x7f00000000c0)='./file0/file0\x00', 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 19:43:35 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ustat(0x0, &(0x7f0000000000)) 19:43:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000180)) 19:43:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 19:43:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f00000000c0)}) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000180)) 19:43:36 executing program 3: syz_open_pts(0xffffffffffffffff, 0x0) ustat(0x0, &(0x7f0000000000)) 19:43:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) creat(&(0x7f00000000c0)='./file0/file0\x00', 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 19:43:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 19:43:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f00000000c0)}) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000180)) 19:43:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) creat(&(0x7f00000000c0)='./file0/file0\x00', 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 19:43:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000003c0)=""/222, 0xfffffffffffffee3, 0x0, 0x0, 0x0) 19:43:36 executing program 3: syz_open_pts(0xffffffffffffffff, 0x0) ustat(0x0, &(0x7f0000000000)) 19:43:36 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000440)={0x0, {{0x2, 0x0, @broadcast=0xffffffff}}}, 0x88) 19:43:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) 19:43:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f00000000c0)}) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000180)) 19:43:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) [ 877.377262] kauditd_printk_skb: 9 callbacks suppressed [ 877.377285] audit: type=1326 audit(1529696616.375:1938): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22604 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:36 executing program 3: syz_open_pts(0xffffffffffffffff, 0x0) ustat(0x0, &(0x7f0000000000)) 19:43:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000000)) 19:43:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000180)) 19:43:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) creat(&(0x7f00000000c0)='./file0/file0\x00', 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 19:43:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 19:43:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000000)) 19:43:36 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000000)) 19:43:36 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) syz_open_pts(0xffffffffffffffff, 0x0) ustat(0x0, &(0x7f0000000000)) 19:43:36 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) getpgrp(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={@mcast1={0xff, 0x1, [], 0x1}, @dev={0xfe, 0x80}, @dev={0xfe, 0x80}}) [ 877.859760] audit: type=1326 audit(1529696616.857:1939): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22635 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:36 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) syz_open_pts(0xffffffffffffffff, 0x0) ustat(0x0, &(0x7f0000000000)) 19:43:36 executing program 2: ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 19:43:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000180)) 19:43:37 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000440)={0x0, {{0x2, 0x0, @broadcast=0xffffffff}}}, 0x88) 19:43:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000000)) 19:43:37 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000000)) 19:43:37 executing program 2: ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 19:43:37 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) syz_open_pts(0xffffffffffffffff, 0x0) ustat(0x0, &(0x7f0000000000)) 19:43:37 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) getpgrp(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={@mcast1={0xff, 0x1, [], 0x1}, @dev={0xfe, 0x80}, @dev={0xfe, 0x80}}) 19:43:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000180)) [ 878.353968] audit: type=1326 audit(1529696617.352:1940): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22677 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:37 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) creat(&(0x7f00000000c0)='./file0/file0\x00', 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 19:43:37 executing program 2: ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 19:43:37 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) syz_open_pts(0xffffffffffffffff, 0x0) ustat(0x0, &(0x7f0000000000)) 19:43:37 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f00000000c0)}) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000180)) 19:43:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000000)) 19:43:37 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) getpgrp(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={@mcast1={0xff, 0x1, [], 0x1}, @dev={0xfe, 0x80}, @dev={0xfe, 0x80}}) 19:43:37 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000000)) [ 878.808252] audit: type=1326 audit(1529696617.806:1941): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22690 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:37 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 19:43:37 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) syz_open_pts(0xffffffffffffffff, 0x0) ustat(0x0, &(0x7f0000000000)) 19:43:38 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) syz_open_pts(0xffffffffffffffff, 0x0) ustat(0x0, &(0x7f0000000000)) 19:43:38 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f00000000c0)}) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000180)) 19:43:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000000)) 19:43:38 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000000)) 19:43:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) getpgrp(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={@mcast1={0xff, 0x1, [], 0x1}, @dev={0xfe, 0x80}, @dev={0xfe, 0x80}}) 19:43:38 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 19:43:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet(0x2, 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000280)=""/148) 19:43:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) creat(&(0x7f00000000c0)='./file0/file0\x00', 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 19:43:38 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f00000000c0)}) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000180)) 19:43:38 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 19:43:38 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) syz_open_pts(0xffffffffffffffff, 0x0) ustat(0x0, &(0x7f0000000000)) 19:43:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000000)) 19:43:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={@mcast1={0xff, 0x1, [], 0x1}, @dev={0xfe, 0x80}, @dev={0xfe, 0x80}}) 19:43:38 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000000)) 19:43:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet(0x2, 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000280)=""/148) [ 879.767792] audit: type=1326 audit(1529696618.766:1942): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22753 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:38 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) syz_open_pts(0xffffffffffffffff, 0x0) ustat(0x0, &(0x7f0000000000)) 19:43:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000006c0)}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 19:43:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet(0x2, 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000280)=""/148) 19:43:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={@mcast1={0xff, 0x1, [], 0x1}, @dev={0xfe, 0x80}, @dev={0xfe, 0x80}}) 19:43:38 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f00000000c0)}) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000180)) 19:43:38 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000000)) 19:43:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000000)) 19:43:39 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) syz_open_pts(0xffffffffffffffff, 0x0) ustat(0x0, &(0x7f0000000000)) 19:43:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet(0x2, 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000280)=""/148) 19:43:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000006c0)}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 19:43:39 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f00000000c0)}) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000180)) 19:43:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000340)) 19:43:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={@mcast1={0xff, 0x1, [], 0x1}, @dev={0xfe, 0x80}, @dev={0xfe, 0x80}}) 19:43:39 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) syz_open_pts(0xffffffffffffffff, 0x0) ustat(0x0, &(0x7f0000000000)) 19:43:39 executing program 6: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000000)) 19:43:39 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000000)) [ 880.714397] audit: type=1326 audit(1529696619.713:1943): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22790 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:39 executing program 6: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000000)) 19:43:39 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f00000000c0)}) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000180)) 19:43:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000006c0)}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 19:43:39 executing program 0: getpgrp(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={@mcast1={0xff, 0x1, [], 0x1}, @dev={0xfe, 0x80}, @dev={0xfe, 0x80}}) 19:43:39 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000000)) 19:43:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000280)=""/148) 19:43:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000340)) 19:43:40 executing program 6: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000000)) 19:43:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f00000000c0)}) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000180)) 19:43:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023d}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 19:43:40 executing program 0: getpgrp(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={@mcast1={0xff, 0x1, [], 0x1}, @dev={0xfe, 0x80}, @dev={0xfe, 0x80}}) 19:43:40 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000000)) 19:43:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000280)=""/148) 19:43:40 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) syz_open_pts(0xffffffffffffffff, 0x0) ustat(0x0, &(0x7f0000000000)) 19:43:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000340)) 19:43:40 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000000)) 19:43:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023d}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 19:43:40 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000000)) 19:43:40 executing program 0: getpgrp(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={@mcast1={0xff, 0x1, [], 0x1}, @dev={0xfe, 0x80}, @dev={0xfe, 0x80}}) 19:43:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f00000000c0)}) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000180)) 19:43:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000280)=""/148) 19:43:40 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000000)) [ 881.698514] audit: type=1326 audit(1529696620.696:1944): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22865 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:40 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) getpgrp(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={@mcast1={0xff, 0x1, [], 0x1}, @dev={0xfe, 0x80}, @dev={0xfe, 0x80}}) 19:43:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023d}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 19:43:40 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000000)) 19:43:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f00000000c0)}) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000180)) 19:43:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000340)) 19:43:40 executing program 1: socket$inet(0x2, 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000280)=""/148) 19:43:40 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000000)) 19:43:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f00000000c0)}) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000180)) 19:43:41 executing program 1: socket$inet(0x2, 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000280)=""/148) 19:43:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 19:43:41 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) getpgrp(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={@mcast1={0xff, 0x1, [], 0x1}, @dev={0xfe, 0x80}, @dev={0xfe, 0x80}}) 19:43:41 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000000)) 19:43:41 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000000)) 19:43:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000340)) 19:43:41 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) syz_open_pts(0xffffffffffffffff, 0x0) ustat(0x0, &(0x7f0000000000)) [ 882.647119] audit: type=1326 audit(1529696621.645:1945): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22909 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f00000000c0)}) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000180)) 19:43:41 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) getpgrp(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={@mcast1={0xff, 0x1, [], 0x1}, @dev={0xfe, 0x80}, @dev={0xfe, 0x80}}) 19:43:41 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000000)) [ 882.732492] audit: type=1326 audit(1529696621.687:1946): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22919 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000000)) 19:43:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000340)) 19:43:41 executing program 1: socket$inet(0x2, 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000280)=""/148) 19:43:41 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000000)) 19:43:41 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) getpgrp(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={@mcast1={0xff, 0x1, [], 0x1}, @dev={0xfe, 0x80}, @dev={0xfe, 0x80}}) 19:43:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f00000000c0)}) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000180)) 19:43:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 19:43:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000000)) 19:43:42 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000000)) 19:43:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000340)) 19:43:42 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) getpgrp(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={@mcast1={0xff, 0x1, [], 0x1}, @dev={0xfe, 0x80}, @dev={0xfe, 0x80}}) 19:43:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f00000000c0)}) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000180)) 19:43:42 executing program 1: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet(0x2, 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000280)=""/148) 19:43:42 executing program 3: r0 = open(&(0x7f0000000000)='.\x00', 0x143042, 0x0) write$binfmt_script(r0, &(0x7f0000001340)=ANY=[], 0x0) [ 883.620750] audit: type=1326 audit(1529696622.619:1947): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22960 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) flistxattr(0xffffffffffffffff, &(0x7f0000000400)=""/247, 0xf7) 19:43:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000000)) [ 883.711874] audit: type=1326 audit(1529696622.666:1948): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22966 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:42 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) getpgrp(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={@mcast1={0xff, 0x1, [], 0x1}, @dev={0xfe, 0x80}, @dev={0xfe, 0x80}}) 19:43:42 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000000)) 19:43:42 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000340)) 19:43:42 executing program 1: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet(0x2, 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000280)=""/148) 19:43:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000000)) 19:43:42 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) getpgrp(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={@mcast1={0xff, 0x1, [], 0x1}, @dev={0xfe, 0x80}, @dev={0xfe, 0x80}}) 19:43:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 19:43:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000040)) 19:43:43 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000340)) 19:43:43 executing program 1: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet(0x2, 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000280)=""/148) 19:43:43 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000000)) 19:43:43 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000000)) 19:43:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) getpgrp(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={@mcast1={0xff, 0x1, [], 0x1}, @dev={0xfe, 0x80}, @dev={0xfe, 0x80}}) 19:43:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f00000000c0)}) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000180)) [ 884.575799] audit: type=1326 audit(1529696623.574:1949): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23016 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:43 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000340)) 19:43:43 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000000)) [ 884.651078] audit: type=1326 audit(1529696623.610:1950): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23024 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) getpgrp(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={@mcast1={0xff, 0x1, [], 0x1}, @dev={0xfe, 0x80}, @dev={0xfe, 0x80}}) 19:43:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000040)) 19:43:43 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000000)) 19:43:43 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000000)) 19:43:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket$inet(0x2, 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000280)=""/148) 19:43:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) getpgrp(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={@mcast1={0xff, 0x1, [], 0x1}, @dev={0xfe, 0x80}, @dev={0xfe, 0x80}}) [ 884.909849] audit: type=1326 audit(1529696623.908:1951): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23051 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 885.015385] audit: type=1326 audit(1529696623.994:1952): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23058 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket$inet(0x2, 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000280)=""/148) 19:43:44 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000340)) 19:43:44 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000000)) 19:43:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000040)) 19:43:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) [ 885.522691] audit: type=1326 audit(1529696624.520:1953): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23066 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f00000000c0)}) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000180)) 19:43:44 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000340)) 19:43:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000040)) [ 885.644919] audit: type=1326 audit(1529696624.643:1954): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23080 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket$inet(0x2, 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000280)=""/148) 19:43:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) 19:43:44 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000340)) 19:43:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000000)) 19:43:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000040)) 19:43:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) getpgrp(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={@mcast1={0xff, 0x1, [], 0x1}, @dev={0xfe, 0x80}, @dev={0xfe, 0x80}}) 19:43:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) socket$inet(0x2, 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000280)=""/148) 19:43:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000340)) 19:43:45 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) 19:43:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000340)) 19:43:45 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000000)) 19:43:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000040)) 19:43:45 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) 19:43:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000340)) 19:43:45 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) socket$inet(0x2, 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000280)=""/148) 19:43:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000040)) 19:43:45 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000300)}, 0x20) 19:43:45 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) 19:43:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000340)) 19:43:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000000)) 19:43:45 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) 19:43:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) getpgrp(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={@mcast1={0xff, 0x1, [], 0x1}, @dev={0xfe, 0x80}, @dev={0xfe, 0x80}}) 19:43:45 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000040)) 19:43:45 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000300)}, 0x20) 19:43:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000340)) 19:43:45 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) 19:43:46 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000000)) 19:43:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) socket$inet(0x2, 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000280)=""/148) 19:43:46 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000040)) 19:43:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000340)) 19:43:46 executing program 2: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) 19:43:46 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000300)}, 0x20) 19:43:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000340)) 19:43:46 executing program 2: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) 19:43:46 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000040)) 19:43:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000280)=""/148) 19:43:46 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000300)}, 0x20) [ 887.818583] kauditd_printk_skb: 7 callbacks suppressed [ 887.818605] audit: type=1326 audit(1529696626.817:1962): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23213 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:46 executing program 2: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) 19:43:46 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000040)) 19:43:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000040), 0x10) 19:43:46 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000040)=""/52) 19:43:46 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000300)}, 0x20) 19:43:47 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000040)) 19:43:47 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) 19:43:47 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000300)}, 0x20) 19:43:47 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000040), 0x10) 19:43:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000000c0)) 19:43:47 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) getpgrp(0xffffffffffffffff) nanosleep(&(0x7f0000000040), &(0x7f00000000c0)) 19:43:47 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000340)) 19:43:47 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) 19:43:47 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000040)) [ 888.573383] audit: type=1326 audit(1529696627.571:1963): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23255 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000000c0)) 19:43:47 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) 19:43:47 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000300)}, 0x20) 19:43:47 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000040)) 19:43:47 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) getpgrp(0xffffffffffffffff) nanosleep(&(0x7f0000000040), &(0x7f00000000c0)) 19:43:47 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000040), 0x10) 19:43:47 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000280)=""/148) [ 888.788875] audit: type=1326 audit(1529696627.787:1964): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23278 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:47 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000040)) 19:43:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) 19:43:47 executing program 4: mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000300)}, 0x20) 19:43:47 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000040), 0x10) 19:43:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000000c0)) 19:43:47 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) getpgrp(0xffffffffffffffff) nanosleep(&(0x7f0000000040), &(0x7f00000000c0)) 19:43:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000340)) 19:43:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000040)) 19:43:48 executing program 4: mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000300)}, 0x20) 19:43:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) [ 889.499072] audit: type=1326 audit(1529696628.497:1965): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23309 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000040), 0x10) 19:43:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) 19:43:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000000c0)) 19:43:48 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) getpgrp(0xffffffffffffffff) nanosleep(&(0x7f0000000040), &(0x7f00000000c0)) 19:43:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000280)=""/148) 19:43:48 executing program 4: mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000300)}, 0x20) 19:43:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000040)) [ 889.776714] audit: type=1326 audit(1529696628.775:1966): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23334 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:48 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000300)}, 0x20) 19:43:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000000c0)) 19:43:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000040)) 19:43:48 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) nanosleep(&(0x7f0000000040), &(0x7f00000000c0)) 19:43:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) 19:43:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) 19:43:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000040), 0x10) 19:43:49 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000300)}, 0x20) 19:43:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000040)) 19:43:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000000c0)) 19:43:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000000c0)) 19:43:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) nanosleep(&(0x7f0000000040), &(0x7f00000000c0)) 19:43:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@remote, @local, @dev}, &(0x7f0000000280)=0xc) 19:43:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) 19:43:49 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000300)}, 0x20) 19:43:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000040)) 19:43:49 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000000), 0x4) 19:43:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000040), 0x10) [ 890.729316] audit: type=1326 audit(1529696629.728:1967): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23377 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) 19:43:49 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000300)}, 0x20) 19:43:49 executing program 6: socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000040), 0x10) 19:43:49 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000000c0)) [ 890.884694] audit: type=1326 audit(1529696629.883:1968): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23393 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) nanosleep(&(0x7f0000000040), &(0x7f00000000c0)) 19:43:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@remote, @local, @dev}, &(0x7f0000000280)=0xc) 19:43:50 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000000), 0x4) 19:43:50 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000300)}, 0x20) 19:43:50 executing program 6: socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000040), 0x10) 19:43:50 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000000c0)) 19:43:50 executing program 7: getpgrp(0xffffffffffffffff) nanosleep(&(0x7f0000000040), &(0x7f00000000c0)) 19:43:50 executing program 6: socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000040), 0x10) 19:43:50 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000300)}, 0x20) 19:43:50 executing program 7: getpgrp(0xffffffffffffffff) nanosleep(&(0x7f0000000040), &(0x7f00000000c0)) 19:43:50 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501cd}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000300)}, 0x20) 19:43:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000040)) [ 891.654442] audit: type=1326 audit(1529696630.652:1969): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23445 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) 19:43:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@remote, @local, @dev}, &(0x7f0000000280)=0xc) 19:43:50 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000000), 0x4) 19:43:50 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000000c0)) 19:43:50 executing program 6: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000040), 0x10) 19:43:50 executing program 7: getpgrp(0xffffffffffffffff) nanosleep(&(0x7f0000000040), &(0x7f00000000c0)) 19:43:50 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501cd}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000300)}, 0x20) 19:43:50 executing program 0: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000000c0)) [ 891.852777] audit: type=1326 audit(1529696630.851:1970): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23463 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:50 executing program 6: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000040), 0x10) 19:43:50 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501cd}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000300)}, 0x20) 19:43:50 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) getpgrp(0xffffffffffffffff) nanosleep(&(0x7f0000000040), &(0x7f00000000c0)) 19:43:51 executing program 0: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000000c0)) 19:43:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000000), 0x4) 19:43:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@remote, @local, @dev}, &(0x7f0000000280)=0xc) 19:43:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000040)) 19:43:51 executing program 6: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000040), 0x10) [ 892.587364] audit: type=1326 audit(1529696631.586:1971): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23496 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:51 executing program 0: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000000c0)) 19:43:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000000), 0x4) 19:43:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@remote, @local, @dev}, &(0x7f0000000280)=0xc) 19:43:51 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) getpgrp(0xffffffffffffffff) nanosleep(&(0x7f0000000040), &(0x7f00000000c0)) 19:43:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000300)}, 0x20) 19:43:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) 19:43:51 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000040), 0x10) 19:43:51 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000000c0)) 19:43:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000000), 0x4) [ 892.850020] kauditd_printk_skb: 1 callbacks suppressed [ 892.850045] audit: type=1326 audit(1529696631.848:1973): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23513 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@remote, @local, @dev}, &(0x7f0000000280)=0xc) 19:43:51 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) getpgrp(0xffffffffffffffff) nanosleep(&(0x7f0000000040), &(0x7f00000000c0)) 19:43:51 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000040), 0x10) 19:43:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000000c0)) 19:43:52 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000000), 0x4) 19:43:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000040), 0x10) 19:43:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) getpgrp(0xffffffffffffffff) nanosleep(&(0x7f0000000040), &(0x7f00000000c0)) 19:43:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000000c0)) 19:43:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000300)}, 0x20) 19:43:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@remote, @local, @dev}, &(0x7f0000000280)=0xc) 19:43:52 executing program 1: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000000), 0x4) 19:43:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501fb}]}) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) 19:43:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) getpgrp(0xffffffffffffffff) nanosleep(&(0x7f0000000040), &(0x7f00000000c0)) 19:43:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000000c0)) 19:43:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000040), 0x10) 19:43:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000001c0)) setitimer(0x0, &(0x7f0000000000)={{}, {0x77359400}}, &(0x7f0000000080)) [ 893.788724] audit: type=1326 audit(1529696632.787:1974): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23564 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000000c0)) 19:43:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) getpgrp(0xffffffffffffffff) nanosleep(&(0x7f0000000040), &(0x7f00000000c0)) 19:43:52 executing program 1: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000000), 0x4) 19:43:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000040), 0x10) 19:43:52 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@remote, @local, @dev}, &(0x7f0000000280)=0xc) 19:43:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000001c0)) setitimer(0x0, &(0x7f0000000000)={{}, {0x77359400}}, &(0x7f0000000080)) 19:43:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) 19:43:53 executing program 1: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000000), 0x4) 19:43:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000040), 0x10) 19:43:53 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000300)}, 0x20) 19:43:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000000c0)) 19:43:53 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000000), 0x4) 19:43:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) getpgrp(0xffffffffffffffff) nanosleep(&(0x7f0000000040), &(0x7f00000000c0)) 19:43:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) 19:43:53 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@remote, @local, @dev}, &(0x7f0000000280)=0xc) 19:43:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000001c0)) setitimer(0x0, &(0x7f0000000000)={{}, {0x77359400}}, &(0x7f0000000080)) 19:43:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000040), 0x10) 19:43:53 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@remote, @local, @dev}, &(0x7f0000000280)=0xc) 19:43:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000000c0)) 19:43:53 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000000), 0x4) [ 894.815262] audit: type=1326 audit(1529696633.813:1975): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23622 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) getpgrp(0xffffffffffffffff) nanosleep(&(0x7f0000000040), &(0x7f00000000c0)) 19:43:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000001c0)) setitimer(0x0, &(0x7f0000000000)={{}, {0x77359400}}, &(0x7f0000000080)) 19:43:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) [ 894.961779] audit: type=1326 audit(1529696633.863:1976): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23625 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 894.981625] audit: type=1326 audit(1529696633.959:1977): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23632 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:54 executing program 5: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@remote, @local, @dev}, &(0x7f0000000280)=0xc) 19:43:54 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000000), 0x4) 19:43:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) setitimer(0x0, &(0x7f0000000000)={{}, {0x77359400}}, &(0x7f0000000080)) 19:43:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) getpgrp(0xffffffffffffffff) nanosleep(&(0x7f0000000040), &(0x7f00000000c0)) 19:43:54 executing program 5: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@remote, @local, @dev}, &(0x7f0000000280)=0xc) 19:43:54 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000000), 0x4) 19:43:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) 19:43:54 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00'}) 19:43:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) getpgrp(0xffffffffffffffff) nanosleep(&(0x7f0000000040), &(0x7f00000000c0)) 19:43:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000040), 0x10) 19:43:54 executing program 5: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@remote, @local, @dev}, &(0x7f0000000280)=0xc) [ 895.872415] audit: type=1326 audit(1529696634.871:1978): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23675 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000000c0)) 19:43:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) setitimer(0x0, &(0x7f0000000000)={{}, {0x77359400}}, &(0x7f0000000080)) 19:43:54 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000000), 0x4) 19:43:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) [ 895.945542] audit: type=1326 audit(1529696634.906:1979): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23678 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:55 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00'}) 19:43:55 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@remote, @local, @dev}, &(0x7f0000000280)=0xc) [ 896.066527] audit: type=1326 audit(1529696635.064:1980): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23691 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:55 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@remote, @local, @dev}, &(0x7f0000000280)=0xc) 19:43:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) setitimer(0x0, &(0x7f0000000000)={{}, {0x77359400}}, &(0x7f0000000080)) 19:43:55 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000000), 0x4) 19:43:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) 19:43:55 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00'}) 19:43:55 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000000), 0x4) 19:43:55 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@remote, @local, @dev}, &(0x7f0000000280)=0xc) 19:43:55 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) getpgrp(0xffffffffffffffff) nanosleep(&(0x7f0000000040), &(0x7f00000000c0)) 19:43:55 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000040), 0x10) 19:43:55 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000001c0)) setitimer(0x0, &(0x7f0000000000)={{}, {0x77359400}}, &(0x7f0000000080)) [ 896.787902] audit: type=1326 audit(1529696635.786:1981): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23720 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 896.843846] audit: type=1326 audit(1529696635.842:1982): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23726 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:55 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000000c0)) 19:43:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) 19:43:55 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00'}) 19:43:55 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@remote, @local, @dev}, &(0x7f0000000280)=0xc) 19:43:55 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000000), 0x4) 19:43:55 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000001c0)) setitimer(0x0, &(0x7f0000000000)={{}, {0x77359400}}, &(0x7f0000000080)) 19:43:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000000), 0x4) 19:43:56 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@remote, @local, @dev}, &(0x7f0000000280)=0xc) 19:43:56 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000001c0)) setitimer(0x0, &(0x7f0000000000)={{}, {0x77359400}}, &(0x7f0000000080)) 19:43:56 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) 19:43:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00'}) 19:43:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000000), 0x4) 19:43:56 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@remote, @local, @dev}, &(0x7f0000000280)=0xc) 19:43:56 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) getpgrp(0xffffffffffffffff) nanosleep(&(0x7f0000000040), &(0x7f00000000c0)) 19:43:56 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000001c0)) setitimer(0x0, &(0x7f0000000000)={{}, {0x77359400}}, &(0x7f0000000080)) 19:43:56 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) 19:43:56 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000001c0)) setitimer(0x0, &(0x7f0000000000)={{}, {0x77359400}}, &(0x7f0000000080)) 19:43:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00'}) 19:43:56 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@remote, @local, @dev}, &(0x7f0000000280)=0xc) 19:43:56 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000040)) 19:43:56 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) 19:43:56 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50249}]}) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000240)={'NETMAP\x00'}, &(0x7f0000000280)=0x1e) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) [ 897.987657] kauditd_printk_skb: 3 callbacks suppressed [ 897.987682] audit: type=1326 audit(1529696636.986:1986): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23786 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:57 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000001c0)) setitimer(0x0, &(0x7f0000000000)={{}, {0x77359400}}, &(0x7f0000000080)) 19:43:57 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) 19:43:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000001c0)) setitimer(0x0, &(0x7f0000000000)={{}, {0x77359400}}, &(0x7f0000000080)) 19:43:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50249}]}) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000240)={'NETMAP\x00'}, &(0x7f0000000280)=0x1e) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) 19:43:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00'}) 19:43:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000000), 0x4) 19:43:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)) syslog(0x0, &(0x7f00000001c0), 0x0) [ 898.323061] audit: type=1326 audit(1529696637.321:1987): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23816 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) accept(0xffffffffffffff9c, &(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, &(0x7f0000000080)=0x80) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, @remote}, &(0x7f0000000100)=0x10) 19:43:57 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) 19:43:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000001c0)) setitimer(0x0, &(0x7f0000000000)={{}, {0x77359400}}, &(0x7f0000000080)) 19:43:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50249}]}) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000240)={'NETMAP\x00'}, &(0x7f0000000280)=0x1e) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) 19:43:57 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) prctl$setptracer(0x59616d61, 0x0) 19:43:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000001c0)) setitimer(0x0, &(0x7f0000000000)={{}, {0x77359400}}, &(0x7f0000000080)) 19:43:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@remote, @local, @dev}, &(0x7f0000000280)=0xc) 19:43:57 executing program 4: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00'}) 19:43:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) accept(0xffffffffffffff9c, &(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, &(0x7f0000000080)=0x80) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, @remote}, &(0x7f0000000100)=0x10) 19:43:57 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) 19:43:57 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) prctl$setptracer(0x59616d61, 0x0) 19:43:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50249}]}) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000240)={'NETMAP\x00'}, &(0x7f0000000280)=0x1e) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) 19:43:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) 19:43:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000001c0)) setitimer(0x0, &(0x7f0000000000)={{}, {0x77359400}}, &(0x7f0000000080)) [ 898.980285] audit: type=1326 audit(1529696637.979:1988): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23855 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000000), 0x4) 19:43:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50249}]}) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) 19:43:58 executing program 4: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00'}) 19:43:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) accept(0xffffffffffffff9c, &(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, &(0x7f0000000080)=0x80) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, @remote}, &(0x7f0000000100)=0x10) 19:43:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) prctl$setptracer(0x59616d61, 0x0) 19:43:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) 19:43:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000001c0)) setitimer(0x0, &(0x7f0000000000)={{}, {0x77359400}}, &(0x7f0000000080)) [ 899.303318] audit: type=1326 audit(1529696638.300:1989): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23883 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) 19:43:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@remote, @local, @dev}, &(0x7f0000000280)=0xc) 19:43:58 executing program 4: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00'}) 19:43:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) prctl$setptracer(0x59616d61, 0x0) 19:43:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000001c0)) setitimer(0x0, &(0x7f0000000000)={{}, {0x77359400}}, &(0x7f0000000080)) 19:43:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50249}]}) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) 19:43:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) accept(0xffffffffffffff9c, &(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, &(0x7f0000000080)=0x80) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, @remote}, &(0x7f0000000100)=0x10) 19:43:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) [ 899.930578] audit: type=1326 audit(1529696638.929:1990): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23897 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:59 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00'}) 19:43:59 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00'}) 19:43:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) 19:43:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000001c0)) setitimer(0x0, &(0x7f0000000000)={{}, {0x77359400}}, &(0x7f0000000080)) 19:43:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) prctl$setptracer(0x59616d61, 0x0) 19:43:59 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50249}]}) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) 19:43:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, @remote}, &(0x7f0000000100)=0x10) 19:43:59 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000180)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) [ 900.244846] audit: type=1326 audit(1529696639.243:1991): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23920 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) 19:43:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) 19:43:59 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00'}) 19:43:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) prctl$setptracer(0x59616d61, 0x0) 19:43:59 executing program 6: getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000240)={'NETMAP\x00'}, &(0x7f0000000280)=0x1e) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) 19:43:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, @remote}, &(0x7f0000000100)=0x10) 19:43:59 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.subtree_control\x00', 0x2, 0x0) fchdir(0xffffffffffffffff) 19:43:59 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000180)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) [ 900.869161] audit: type=1326 audit(1529696639.867:1992): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23953 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:43:59 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00'}) 19:43:59 executing program 6: getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000240)={'NETMAP\x00'}, &(0x7f0000000280)=0x1e) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) 19:44:00 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, @remote}, &(0x7f0000000100)=0x10) 19:44:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000001c0)) setitimer(0x0, &(0x7f0000000000)={{}, {0x77359400}}, &(0x7f0000000080)) 19:44:00 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000180)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) 19:44:00 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) prctl$setptracer(0x59616d61, 0x0) 19:44:00 executing program 6: getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000240)={'NETMAP\x00'}, &(0x7f0000000280)=0x1e) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) 19:44:00 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00'}) 19:44:00 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.subtree_control\x00', 0x2, 0x0) fchdir(0xffffffffffffffff) [ 901.263203] audit: type=1326 audit(1529696640.261:1993): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23989 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) 19:44:00 executing program 0: accept(0xffffffffffffff9c, &(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, &(0x7f0000000080)=0x80) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, @remote}, &(0x7f0000000100)=0x10) 19:44:00 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00'}) 19:44:00 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50249}]}) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000240)={'NETMAP\x00'}, &(0x7f0000000280)=0x1e) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) 19:44:00 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.subtree_control\x00', 0x2, 0x0) fchdir(0xffffffffffffffff) 19:44:00 executing program 7: openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) prctl$setptracer(0x59616d61, 0x0) 19:44:00 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000180)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) [ 901.828580] audit: type=1326 audit(1529696640.827:1994): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23999 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:00 executing program 0: accept(0xffffffffffffff9c, &(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, &(0x7f0000000080)=0x80) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, @remote}, &(0x7f0000000100)=0x10) 19:44:00 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50249}]}) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000240)={'NETMAP\x00'}, &(0x7f0000000280)=0x1e) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) 19:44:00 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00'}) 19:44:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000001c0)) setitimer(0x0, &(0x7f0000000000)={{}, {0x77359400}}, &(0x7f0000000080)) 19:44:01 executing program 7: openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) prctl$setptracer(0x59616d61, 0x0) 19:44:01 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000180)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) 19:44:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.subtree_control\x00', 0x2, 0x0) fchdir(0xffffffffffffffff) 19:44:01 executing program 0: accept(0xffffffffffffff9c, &(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, &(0x7f0000000080)=0x80) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, @remote}, &(0x7f0000000100)=0x10) 19:44:01 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50249}]}) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000240)={'NETMAP\x00'}, &(0x7f0000000280)=0x1e) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) [ 902.211753] audit: type=1326 audit(1529696641.210:1995): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24039 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) 19:44:01 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00'}) 19:44:01 executing program 7: openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) prctl$setptracer(0x59616d61, 0x0) 19:44:01 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) accept(0xffffffffffffff9c, &(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, &(0x7f0000000080)=0x80) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, @remote}, &(0x7f0000000100)=0x10) 19:44:01 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000006c0)}) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000240)={'NETMAP\x00'}, &(0x7f0000000280)=0x1e) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) 19:44:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) fchdir(0xffffffffffffffff) 19:44:01 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000180)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) 19:44:01 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) accept(0xffffffffffffff9c, &(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, &(0x7f0000000080)=0x80) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, @remote}, &(0x7f0000000100)=0x10) 19:44:01 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000006c0)}) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000240)={'NETMAP\x00'}, &(0x7f0000000280)=0x1e) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) 19:44:01 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00'}) 19:44:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00'}) 19:44:02 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) prctl$setptracer(0x59616d61, 0x0) 19:44:02 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000180)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) 19:44:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) fchdir(0xffffffffffffffff) 19:44:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000006c0)}) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000240)={'NETMAP\x00'}, &(0x7f0000000280)=0x1e) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) 19:44:02 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) accept(0xffffffffffffff9c, &(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, &(0x7f0000000080)=0x80) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, @remote}, &(0x7f0000000100)=0x10) [ 903.154816] kauditd_printk_skb: 1 callbacks suppressed [ 903.154838] audit: type=1326 audit(1529696642.153:1997): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24085 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) fchdir(0xffffffffffffffff) 19:44:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 19:44:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000006c0)}) accept(0xffffffffffffff9c, &(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, &(0x7f0000000080)=0x80) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, @remote}, &(0x7f0000000100)=0x10) 19:44:02 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) prctl$setptracer(0x59616d61, 0x0) 19:44:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50249}]}) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000240)={'NETMAP\x00'}, &(0x7f0000000280)=0x1e) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) 19:44:02 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000180)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) 19:44:02 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) creat(&(0x7f0000000280)='./file1\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='system@') 19:44:02 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) prctl$setptracer(0x59616d61, 0x0) 19:44:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000006c0)}) accept(0xffffffffffffff9c, &(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, &(0x7f0000000080)=0x80) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, @remote}, &(0x7f0000000100)=0x10) 19:44:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50249}]}) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000240)={'NETMAP\x00'}, &(0x7f0000000280)=0x1e) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) 19:44:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00'}) 19:44:03 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000180)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) 19:44:03 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) creat(&(0x7f0000000280)='./file1\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='system@') 19:44:03 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.subtree_control\x00', 0x2, 0x0) fchdir(0xffffffffffffffff) 19:44:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 19:44:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000006c0)}) accept(0xffffffffffffff9c, &(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, &(0x7f0000000080)=0x80) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, @remote}, &(0x7f0000000100)=0x10) 19:44:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50249}]}) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000240)={'NETMAP\x00'}, &(0x7f0000000280)=0x1e) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) 19:44:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) prctl$setptracer(0x59616d61, 0x0) 19:44:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023d}]}) accept(0xffffffffffffff9c, &(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, &(0x7f0000000080)=0x80) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, @remote}, &(0x7f0000000100)=0x10) [ 904.148789] audit: type=1326 audit(1529696643.147:1998): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24145 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:03 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000180)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) 19:44:03 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.subtree_control\x00', 0x2, 0x0) fchdir(0xffffffffffffffff) 19:44:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) prctl$setptracer(0x59616d61, 0x0) 19:44:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000006c0)=[{0x6}]}) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000240)={'NETMAP\x00'}, &(0x7f0000000280)=0x1e) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) 19:44:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 19:44:03 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) creat(&(0x7f0000000280)='./file1\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='system@') [ 904.385185] audit: type=1326 audit(1529696643.383:1999): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24161 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:03 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000180)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) 19:44:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) prctl$setptracer(0x59616d61, 0x0) 19:44:04 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000180)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) 19:44:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023d}]}) accept(0xffffffffffffff9c, &(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, &(0x7f0000000080)=0x80) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, @remote}, &(0x7f0000000100)=0x10) 19:44:04 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 19:44:04 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.subtree_control\x00', 0x2, 0x0) fchdir(0xffffffffffffffff) 19:44:04 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) creat(&(0x7f0000000280)='./file1\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='system@') 19:44:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00'}) [ 905.099118] audit: type=1326 audit(1529696644.097:2000): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24180 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023d}]}) accept(0xffffffffffffff9c, &(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, &(0x7f0000000080)=0x80) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, @remote}, &(0x7f0000000100)=0x10) 19:44:04 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000180)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) 19:44:04 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.subtree_control\x00', 0x2, 0x0) fchdir(0xffffffffffffffff) 19:44:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) prctl$setptracer(0x59616d61, 0x0) 19:44:04 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='system@') 19:44:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000006c0)=[{0x6}]}) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000240)={'NETMAP\x00'}, &(0x7f0000000280)=0x1e) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) 19:44:04 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) faccessat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 19:44:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6}]}) accept(0xffffffffffffff9c, &(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, &(0x7f0000000080)=0x80) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, @remote}, &(0x7f0000000100)=0x10) 19:44:04 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000180)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) 19:44:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) prctl$setptracer(0x59616d61, 0x0) [ 905.440027] audit: type=1326 audit(1529696644.438:2001): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24214 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 905.531934] audit: type=1326 audit(1529696644.504:2002): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24218 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:05 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) prctl$setptracer(0x59616d61, 0x0) 19:44:05 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.subtree_control\x00', 0x2, 0x0) fchdir(0xffffffffffffffff) 19:44:05 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='system@') 19:44:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) faccessat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 19:44:05 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000180)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) 19:44:05 executing program 4: symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') creat(&(0x7f00000000c0)='./file0/file0\x00', 0x0) 19:44:05 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.subtree_control\x00', 0x2, 0x0) fchdir(0xffffffffffffffff) 19:44:05 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) prctl$setptracer(0x59616d61, 0x0) 19:44:05 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000180)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) 19:44:05 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='system@') 19:44:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) epoll_pwait(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f00000001c0), 0x8) [ 906.224200] audit: type=1326 audit(1529696645.222:2003): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24249 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:05 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000006c0)=[{0x6}]}) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000240)={'NETMAP\x00'}, &(0x7f0000000280)=0x1e) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) 19:44:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) faccessat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 19:44:05 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6}]}) accept(0xffffffffffffff9c, &(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, &(0x7f0000000080)=0x80) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, @remote}, &(0x7f0000000100)=0x10) 19:44:05 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000180)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) 19:44:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.subtree_control\x00', 0x2, 0x0) fchdir(0xffffffffffffffff) 19:44:05 executing program 3: creat(&(0x7f0000000280)='./file1\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='system@') 19:44:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) epoll_pwait(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f00000001c0), 0x8) [ 906.459214] audit: type=1326 audit(1529696645.458:2004): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24267 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:05 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 906.545613] audit: type=1326 audit(1529696645.543:2005): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24272 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:05 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000180)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) 19:44:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.subtree_control\x00', 0x2, 0x0) fchdir(0xffffffffffffffff) 19:44:05 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 19:44:05 executing program 3: creat(&(0x7f0000000280)='./file1\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='system@') 19:44:06 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) prctl$setptracer(0x59616d61, 0x0) 19:44:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) epoll_pwait(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f00000001c0), 0x8) 19:44:06 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 19:44:06 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000180)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) [ 907.139859] audit: type=1326 audit(1529696646.138:2006): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24303 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.subtree_control\x00', 0x2, 0x0) fchdir(0xffffffffffffffff) 19:44:06 executing program 3: creat(&(0x7f0000000280)='./file1\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='system@') 19:44:06 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6}]}) accept(0xffffffffffffff9c, &(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, &(0x7f0000000080)=0x80) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, @remote}, &(0x7f0000000100)=0x10) 19:44:06 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000180)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) 19:44:06 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 19:44:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) epoll_pwait(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f00000001c0), 0x8) 19:44:06 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000180)={'icmp6\x00'}, &(0x7f00000001c0)=0x1e) 19:44:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.subtree_control\x00', 0x2, 0x0) fchdir(0xffffffffffffffff) 19:44:06 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) creat(&(0x7f0000000280)='./file1\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='system@') 19:44:06 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 19:44:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.subtree_control\x00', 0x2, 0x0) fchdir(0xffffffffffffffff) 19:44:06 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) creat(&(0x7f0000000280)='./file1\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='system@') 19:44:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000180)={'icmp6\x00'}, &(0x7f00000001c0)=0x1e) 19:44:07 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) creat(&(0x7f0000000280)='./file1\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='system@') 19:44:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) epoll_pwait(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f00000001c0), 0x8) 19:44:07 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 19:44:07 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) prctl$setptracer(0x59616d61, 0x0) 19:44:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.subtree_control\x00', 0x2, 0x0) fchdir(0xffffffffffffffff) 19:44:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 19:44:07 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) creat(&(0x7f0000000280)='./file1\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='system@') 19:44:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.subtree_control\x00', 0x2, 0x0) fchdir(0xffffffffffffffff) 19:44:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) epoll_pwait(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f00000001c0), 0x8) 19:44:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000180)={'icmp6\x00'}, &(0x7f00000001c0)=0x1e) 19:44:07 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000180)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) 19:44:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f7}]}) remap_file_pages(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, &(0x7f00000001c0)) [ 908.465770] kauditd_printk_skb: 3 callbacks suppressed [ 908.465794] audit: type=1326 audit(1529696647.464:2010): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24375 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 19:44:07 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) creat(&(0x7f0000000280)='./file1\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='system@') [ 908.537295] audit: type=1326 audit(1529696647.504:2011): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24381 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) epoll_pwait(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f00000001c0), 0x8) 19:44:07 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) creat(&(0x7f0000000280)='./file1\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='system@') 19:44:08 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) epoll_pwait(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f00000001c0), 0x8) 19:44:08 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f7}]}) socket$inet(0x2, 0x0, 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f0000000380)=@abs, &(0x7f0000000400)=0x6e) 19:44:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 19:44:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000180)={'icmp6\x00'}, &(0x7f00000001c0)=0x1e) 19:44:08 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) creat(&(0x7f0000000280)='./file1\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='system@') 19:44:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000040)={0x0, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)='nr0\x00'}) 19:44:08 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) epoll_pwait(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f00000001c0), 0x8) 19:44:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.subtree_control\x00', 0x2, 0x0) fchdir(0xffffffffffffffff) 19:44:08 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) creat(&(0x7f0000000280)='./file1\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='system@') 19:44:08 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f7}]}) socket$inet(0x2, 0x0, 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f0000000380)=@abs, &(0x7f0000000400)=0x6e) 19:44:08 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000180)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) 19:44:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 19:44:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000180)={'icmp6\x00'}, &(0x7f00000001c0)=0x1e) 19:44:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000040)={0x0, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)='nr0\x00'}) 19:44:08 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) epoll_pwait(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f00000001c0), 0x8) 19:44:08 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) creat(&(0x7f0000000280)='./file1\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='system@') [ 909.404533] audit: type=1326 audit(1529696648.403:2012): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24438 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:08 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f7}]}) socket$inet(0x2, 0x0, 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f0000000380)=@abs, &(0x7f0000000400)=0x6e) [ 909.524338] audit: type=1326 audit(1529696648.523:2013): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24453 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:08 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) creat(&(0x7f0000000280)='./file1\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='system@') 19:44:08 executing program 4: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) epoll_pwait(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f00000001c0), 0x8) 19:44:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 19:44:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000180)={'icmp6\x00'}, &(0x7f00000001c0)=0x1e) [ 909.652943] audit: type=1326 audit(1529696648.651:2014): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24460 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000040)={0x0, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)='nr0\x00'}) 19:44:08 executing program 4: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) epoll_pwait(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f00000001c0), 0x8) 19:44:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f7}]}) socket$inet(0x2, 0x0, 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f0000000380)=@abs, &(0x7f0000000400)=0x6e) 19:44:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000040)={0x0, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)='nr0\x00'}) 19:44:09 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.subtree_control\x00', 0x2, 0x0) fchdir(0xffffffffffffffff) [ 910.352626] audit: type=1326 audit(1529696649.351:2015): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24488 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f7}]}) getsockname$unix(0xffffffffffffffff, &(0x7f0000000380)=@abs, &(0x7f0000000400)=0x6e) 19:44:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 19:44:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000180)={'icmp6\x00'}, &(0x7f00000001c0)=0x1e) 19:44:09 executing program 4: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) epoll_pwait(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f00000001c0), 0x8) 19:44:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f7}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000000)) 19:44:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000040)={0x0, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)='nr0\x00'}) 19:44:09 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) epoll_pwait(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f00000001c0), 0x8) 19:44:09 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) creat(&(0x7f0000000280)='./file1\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='system@') 19:44:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 19:44:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f7}]}) getsockname$unix(0xffffffffffffffff, &(0x7f0000000380)=@abs, &(0x7f0000000400)=0x6e) 19:44:09 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000180)={'icmp6\x00'}, &(0x7f00000001c0)=0x1e) [ 910.690858] audit: type=1326 audit(1529696649.689:2016): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24511 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) gettid() 19:44:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000040)={0x0, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)='nr0\x00'}) [ 910.778824] audit: type=1326 audit(1529696649.723:2017): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24514 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:09 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) epoll_pwait(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f00000001c0), 0x8) 19:44:10 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000180)={'icmp6\x00'}, &(0x7f00000001c0)=0x1e) 19:44:10 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f7}]}) getsockname$unix(0xffffffffffffffff, &(0x7f0000000380)=@abs, &(0x7f0000000400)=0x6e) 19:44:10 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000040)={0x0, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)='nr0\x00'}) 19:44:10 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) epoll_pwait(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f00000001c0), 0x8) 19:44:10 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) gettid() 19:44:10 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) epoll_pwait(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f00000001c0), 0x8) 19:44:10 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000180)={'icmp6\x00'}, &(0x7f00000001c0)=0x1e) 19:44:10 executing program 7: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000040)={0x0, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)='nr0\x00'}) 19:44:10 executing program 0: socket$inet(0x2, 0x0, 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f0000000380)=@abs, &(0x7f0000000400)=0x6e) 19:44:10 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) creat(&(0x7f0000000280)='./file1\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='system@') 19:44:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 19:44:10 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) gettid() 19:44:10 executing program 7: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000040)={0x0, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)='nr0\x00'}) 19:44:10 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000180)={'icmp6\x00'}, &(0x7f00000001c0)=0x1e) 19:44:10 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) epoll_pwait(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f00000001c0), 0x8) [ 911.630318] audit: type=1326 audit(1529696650.629:2018): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24568 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:10 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) epoll_pwait(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f00000001c0), 0x8) 19:44:10 executing program 7: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000040)={0x0, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)='nr0\x00'}) [ 911.730088] audit: type=1326 audit(1529696650.728:2019): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24581 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:10 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000180)={'icmp6\x00'}, &(0x7f00000001c0)=0x1e) 19:44:10 executing program 0: socket$inet(0x2, 0x0, 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f0000000380)=@abs, &(0x7f0000000400)=0x6e) 19:44:10 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) gettid() 19:44:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) epoll_pwait(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f00000001c0), 0x8) 19:44:11 executing program 0: socket$inet(0x2, 0x0, 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f0000000380)=@abs, &(0x7f0000000400)=0x6e) 19:44:11 executing program 7: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000040)={0x0, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)='nr0\x00'}) 19:44:11 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000180)={'icmp6\x00'}, &(0x7f00000001c0)=0x1e) 19:44:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) gettid() 19:44:11 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f7}]}) socket$inet(0x2, 0x0, 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f0000000380)=@abs, &(0x7f0000000400)=0x6e) 19:44:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 19:44:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000180)={'icmp6\x00'}, &(0x7f00000001c0)=0x1e) 19:44:11 executing program 7: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000040)={0x0, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)='nr0\x00'}) 19:44:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) gettid() 19:44:11 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f7}]}) socket$inet(0x2, 0x0, 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f0000000380)=@abs, &(0x7f0000000400)=0x6e) 19:44:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000180)={'icmp6\x00'}, &(0x7f00000001c0)=0x1e) 19:44:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) gettid() 19:44:11 executing program 7: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000040)={0x0, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)='nr0\x00'}) 19:44:11 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000040)={0x0, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)='nr0\x00'}) 19:44:12 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f7}]}) socket$inet(0x2, 0x0, 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f0000000380)=@abs, &(0x7f0000000400)=0x6e) 19:44:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) epoll_pwait(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f00000001c0), 0x8) 19:44:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000180)={'icmp6\x00'}, &(0x7f00000001c0)=0x1e) 19:44:12 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) gettid() 19:44:12 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000040)={0x0, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)='nr0\x00'}) 19:44:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000180)={'icmp6\x00'}, &(0x7f00000001c0)=0x1e) 19:44:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f0000000380)=@abs, &(0x7f0000000400)=0x6e) 19:44:12 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket(0x0, 0x0, 0x0) rt_sigaction(0x0, &(0x7f0000000000), &(0x7f0000000040), 0x8, &(0x7f0000000080)) 19:44:12 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) gettid() 19:44:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f0000000380)=@abs, &(0x7f0000000400)=0x6e) 19:44:12 executing program 5: io_submit(0x0, 0x1ffffffffffffd37, &(0x7f0000000000)) 19:44:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000180)={'icmp6\x00'}, &(0x7f00000001c0)=0x1e) 19:44:12 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000040)={0x0, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)='nr0\x00'}) 19:44:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) keyctl$set_reqkey_keyring(0xe, 0x0) 19:44:12 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000040)={0x0, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)='nr0\x00'}) 19:44:12 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) gettid() 19:44:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000980)={0x10}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a00)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 19:44:13 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) epoll_pwait(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f00000001c0), 0x8) 19:44:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000180)={'icmp6\x00'}, &(0x7f00000001c0)=0x1e) 19:44:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f0000000380)=@abs, &(0x7f0000000400)=0x6e) 19:44:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) keyctl$set_reqkey_keyring(0xe, 0x0) 19:44:13 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket(0x0, 0x0, 0x0) rt_sigaction(0x0, &(0x7f0000000000), &(0x7f0000000040), 0x8, &(0x7f0000000080)) 19:44:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000040)={0x0, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)='nr0\x00'}) 19:44:13 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) gettid() 19:44:13 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000980)={0x10}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a00)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) [ 914.183596] kauditd_printk_skb: 3 callbacks suppressed [ 914.183621] audit: type=1326 audit(1529696653.182:2023): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24732 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000180)={'icmp6\x00'}, &(0x7f00000001c0)=0x1e) 19:44:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) keyctl$set_reqkey_keyring(0xe, 0x0) 19:44:13 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) gettid() 19:44:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000040)={0x0, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)='nr0\x00'}) 19:44:13 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000980)={0x10}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a00)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 19:44:13 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket(0x0, 0x0, 0x0) rt_sigaction(0x0, &(0x7f0000000000), &(0x7f0000000040), 0x8, &(0x7f0000000080)) 19:44:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f7}]}) socket$inet(0x2, 0x0, 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f0000000380)=@abs, &(0x7f0000000400)=0x6e) [ 914.388579] audit: type=1326 audit(1529696653.387:2024): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24744 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) keyctl$set_reqkey_keyring(0xe, 0x0) 19:44:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) keyctl$set_reqkey_keyring(0xe, 0x0) 19:44:14 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) gettid() 19:44:14 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000040)={0x0, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)='nr0\x00'}) 19:44:14 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000980)={0x10}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a00)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 19:44:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f7}]}) socket$inet(0x2, 0x0, 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f0000000380)=@abs, &(0x7f0000000400)=0x6e) 19:44:14 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket(0x0, 0x0, 0x0) rt_sigaction(0x0, &(0x7f0000000000), &(0x7f0000000040), 0x8, &(0x7f0000000080)) 19:44:14 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000200)=ANY=[], 0x0) [ 915.120801] audit: type=1326 audit(1529696654.119:2025): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24777 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) gettid() 19:44:14 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000180)={'icmp6\x00'}, &(0x7f00000001c0)=0x1e) 19:44:14 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) rt_sigaction(0x0, &(0x7f0000000000), &(0x7f0000000040), 0x8, &(0x7f0000000080)) 19:44:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) keyctl$set_reqkey_keyring(0xe, 0x0) 19:44:14 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000980)={0x10}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a00)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 19:44:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f7}]}) socket$inet(0x2, 0x0, 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f0000000380)=@abs, &(0x7f0000000400)=0x6e) 19:44:14 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000200)=ANY=[], 0x0) 19:44:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) gettid() [ 915.457766] audit: type=1326 audit(1529696654.456:2026): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24806 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) keyctl$set_reqkey_keyring(0xe, 0x0) 19:44:14 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) rt_sigaction(0x0, &(0x7f0000000000), &(0x7f0000000040), 0x8, &(0x7f0000000080)) 19:44:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) gettid() 19:44:15 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000040)={0x0, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)='nr0\x00'}) 19:44:15 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000980)={0x10}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a00)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 19:44:15 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f0000000380)=@abs, &(0x7f0000000400)=0x6e) 19:44:15 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) keyctl$set_reqkey_keyring(0xe, 0x0) 19:44:15 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000200)=ANY=[], 0x0) 19:44:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) gettid() [ 916.071109] audit: type=1326 audit(1529696655.069:2027): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24838 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 916.156079] audit: type=1326 audit(1529696655.108:2028): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24845 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:15 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000180)={'icmp6\x00'}, &(0x7f00000001c0)=0x1e) 19:44:15 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) rt_sigaction(0x0, &(0x7f0000000000), &(0x7f0000000040), 0x8, &(0x7f0000000080)) 19:44:15 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000980)={0x10}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a00)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 19:44:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) gettid() 19:44:15 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) keyctl$set_reqkey_keyring(0xe, 0x0) 19:44:15 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000200)=ANY=[], 0x0) [ 916.414748] audit: type=1326 audit(1529696655.413:2029): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24863 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:15 executing program 3: socket(0x0, 0x0, 0x0) rt_sigaction(0x0, &(0x7f0000000000), &(0x7f0000000040), 0x8, &(0x7f0000000080)) 19:44:15 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) keyctl$set_reqkey_keyring(0xe, 0x0) 19:44:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) gettid() 19:44:15 executing program 5: openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000980)={0x10}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a00)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 19:44:16 executing program 2: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) keyctl$set_reqkey_keyring(0xe, 0x0) 19:44:16 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000040)={0x0, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)='nr0\x00'}) 19:44:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000200)=ANY=[], 0x0) 19:44:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) gettid() 19:44:16 executing program 3: socket(0x0, 0x0, 0x0) rt_sigaction(0x0, &(0x7f0000000000), &(0x7f0000000040), 0x8, &(0x7f0000000080)) 19:44:16 executing program 5: openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000980)={0x10}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a00)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) [ 917.055053] audit: type=1326 audit(1529696656.053:2030): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24887 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 917.113710] audit: type=1326 audit(1529696656.091:2031): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24898 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:16 executing program 2: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) keyctl$set_reqkey_keyring(0xe, 0x0) 19:44:16 executing program 5: openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000980)={0x10}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a00)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 19:44:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000200)=ANY=[], 0x0) 19:44:16 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f0000000380)=@abs, &(0x7f0000000400)=0x6e) 19:44:16 executing program 3: socket(0x0, 0x0, 0x0) rt_sigaction(0x0, &(0x7f0000000000), &(0x7f0000000040), 0x8, &(0x7f0000000080)) 19:44:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000200)) 19:44:16 executing program 2: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) keyctl$set_reqkey_keyring(0xe, 0x0) [ 917.360957] audit: type=1326 audit(1529696656.359:2032): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24908 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:16 executing program 5: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000980)={0x10}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a00)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 19:44:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000200)=ANY=[], 0x0) 19:44:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket$inet_icmp_raw(0x2, 0x3, 0x1) keyctl$set_reqkey_keyring(0xe, 0x0) 19:44:16 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket(0x0, 0x0, 0x0) rt_sigaction(0x0, &(0x7f0000000000), &(0x7f0000000040), 0x8, &(0x7f0000000080)) 19:44:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) gettid() 19:44:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket$inet_icmp_raw(0x2, 0x3, 0x1) keyctl$set_reqkey_keyring(0xe, 0x0) 19:44:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='proc\x00', 0x0, &(0x7f0000000200)) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000040)) 19:44:17 executing program 5: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000980)={0x10}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a00)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 19:44:17 executing program 4: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000200)=ANY=[], 0x0) 19:44:17 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket(0x0, 0x0, 0x0) rt_sigaction(0x0, &(0x7f0000000000), &(0x7f0000000040), 0x8, &(0x7f0000000080)) 19:44:17 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) getpid() socket$nl_route(0x10, 0x3, 0x0) 19:44:17 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket(0x0, 0x0, 0x0) rt_sigaction(0x0, &(0x7f0000000000), &(0x7f0000000040), 0x8, &(0x7f0000000080)) 19:44:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f0000000380)=@abs, &(0x7f0000000400)=0x6e) 19:44:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket$inet_icmp_raw(0x2, 0x3, 0x1) keyctl$set_reqkey_keyring(0xe, 0x0) 19:44:17 executing program 5: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000980)={0x10}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a00)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 19:44:17 executing program 4: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000200)=ANY=[], 0x0) 19:44:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='proc\x00', 0x0, &(0x7f0000000200)) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000040)) 19:44:17 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) getpid() socket$nl_route(0x10, 0x3, 0x0) 19:44:17 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket(0x0, 0x0, 0x0) rt_sigaction(0x0, &(0x7f0000000000), &(0x7f0000000040), 0x8, &(0x7f0000000080)) 19:44:17 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000980)={0x10}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a00)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 19:44:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) gettid() 19:44:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) keyctl$set_reqkey_keyring(0xe, 0x0) 19:44:17 executing program 4: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000200)=ANY=[], 0x0) 19:44:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='proc\x00', 0x0, &(0x7f0000000200)) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000040)) 19:44:17 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) getpid() socket$nl_route(0x10, 0x3, 0x0) 19:44:17 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000980)={0x10}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a00)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 19:44:17 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket(0x0, 0x0, 0x0) rt_sigaction(0x0, &(0x7f0000000000), &(0x7f0000000040), 0x8, &(0x7f0000000080)) 19:44:18 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket(0x0, 0x0, 0x0) rt_sigaction(0x0, &(0x7f0000000000), &(0x7f0000000040), 0x8, &(0x7f0000000080)) 19:44:18 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) socket(0x0, 0x0, 0x0) rt_sigaction(0x0, &(0x7f0000000000), &(0x7f0000000040), 0x8, &(0x7f0000000080)) 19:44:18 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000200)=ANY=[], 0x0) 19:44:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000980)={0x10}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a00)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 19:44:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) keyctl$set_reqkey_keyring(0xe, 0x0) 19:44:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='proc\x00', 0x0, &(0x7f0000000200)) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000040)) 19:44:18 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) getpid() socket$nl_route(0x10, 0x3, 0x0) 19:44:18 executing program 0: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) select(0x40, &(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)={0x0, 0x7530}) 19:44:18 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000200)=ANY=[], 0x0) 19:44:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000980)={0x10}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a00)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 19:44:18 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) socket$nl_route(0x10, 0x3, 0x0) 19:44:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) keyctl$set_reqkey_keyring(0xe, 0x0) 19:44:18 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000200)=ANY=[], 0x0) 19:44:18 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ee}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00'}, 0x10) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000000), &(0x7f0000000080)=0xfffffffffffffe52) 19:44:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000040)) 19:44:18 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) socket(0x0, 0x0, 0x0) rt_sigaction(0x0, &(0x7f0000000000), &(0x7f0000000040), 0x8, &(0x7f0000000080)) 19:44:18 executing program 1: io_submit(0x0, 0x1, &(0x7f00000001c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000040)="e70c501d79a281189c5364d4521c85302a7c5139266dc5a4f36f2770577a736fdcec41eee848759b116930c3baa8d5d8eae642ca63f37fe782327d8ea22bfcb0c7a6e0773d3b13ec9ba765eb61e8b58ac44540ab42d897d6edca27413bad55a2b106537168e59a836756919f6469b6b024bb16c2a51273654afafaae79bcf54d6072fa251c1682f2c4067a78846d8a670588cf8b5dfdff756103a73369768f33f59be98b4df0bcb0ec8617e537c1971c2ff4ff39e2c8e8d0e50188ac5180b494fd877c11c2c695a00affd46298d7e508b06de81b71045458d1bc3ed16ff1dcdec3f5d0520a802cad8908234f1bba012910b2", 0xf2, 0x3}]) 19:44:19 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000980)={0x10}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a00)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 19:44:19 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000200)=ANY=[], 0x0) 19:44:19 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) socket(0x0, 0x0, 0x0) rt_sigaction(0x0, &(0x7f0000000000), &(0x7f0000000040), 0x8, &(0x7f0000000080)) 19:44:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) keyctl$set_reqkey_keyring(0xe, 0x0) 19:44:19 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000040)) 19:44:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) seccomp(0x0, 0x0, &(0x7f0000000080)) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000140)) 19:44:19 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) socket$nl_route(0x10, 0x3, 0x0) 19:44:19 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ee}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00'}, 0x10) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000000), &(0x7f0000000080)=0xfffffffffffffe52) [ 920.184426] kauditd_printk_skb: 3 callbacks suppressed [ 920.184447] audit: type=1326 audit(1529696659.183:2036): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25084 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:19 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000200)=ANY=[], 0x0) 19:44:19 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000980)={0x10}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a00)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 19:44:19 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket(0x0, 0x0, 0x0) rt_sigaction(0x0, &(0x7f0000000000), &(0x7f0000000040), 0x8, &(0x7f0000000080)) 19:44:19 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) socket$nl_route(0x10, 0x3, 0x0) 19:44:19 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000040)) [ 920.439444] audit: type=1326 audit(1529696659.438:2037): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25105 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:19 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000200)=ANY=[], 0x0) 19:44:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) seccomp(0x0, 0x0, &(0x7f0000000080)) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000140)) 19:44:19 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ee}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00'}, 0x10) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000000), &(0x7f0000000080)=0xfffffffffffffe52) 19:44:19 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000980)={0x10}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a00)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 19:44:19 executing program 7: getpid() socket$nl_route(0x10, 0x3, 0x0) [ 920.640327] audit: type=1326 audit(1529696659.638:2038): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25122 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:19 executing program 6: mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='proc\x00', 0x0, &(0x7f0000000200)) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000040)) 19:44:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) keyctl$set_reqkey_keyring(0xe, 0x0) 19:44:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000200)=ANY=[], 0x0) 19:44:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) seccomp(0x0, 0x0, &(0x7f0000000080)) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000140)) 19:44:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ee}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00'}, 0x10) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000000), &(0x7f0000000080)=0xfffffffffffffe52) 19:44:20 executing program 7: getpid() socket$nl_route(0x10, 0x3, 0x0) 19:44:20 executing program 6: mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='proc\x00', 0x0, &(0x7f0000000200)) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000040)) [ 921.107173] audit: type=1326 audit(1529696660.105:2039): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25137 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:20 executing program 6: mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='proc\x00', 0x0, &(0x7f0000000200)) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000040)) 19:44:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket(0x0, 0x0, 0x0) rt_sigaction(0x0, &(0x7f0000000000), &(0x7f0000000040), 0x8, &(0x7f0000000080)) 19:44:20 executing program 7: getpid() socket$nl_route(0x10, 0x3, 0x0) 19:44:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000200)=ANY=[], 0x0) 19:44:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) seccomp(0x0, 0x0, &(0x7f0000000080)) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000140)) 19:44:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ee}]}) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000000), &(0x7f0000000080)=0xfffffffffffffe52) 19:44:20 executing program 6: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='proc\x00', 0x0, &(0x7f0000000200)) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000040)) [ 921.398427] audit: type=1326 audit(1529696660.397:2040): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25158 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:20 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000980)={0x10}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a00)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 19:44:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ee}]}) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000000), &(0x7f0000000080)=0xfffffffffffffe52) 19:44:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000200)=ANY=[], 0x0) [ 921.660744] audit: type=1326 audit(1529696660.659:2041): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25177 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) keyctl$set_reqkey_keyring(0xe, 0x0) 19:44:21 executing program 6: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='proc\x00', 0x0, &(0x7f0000000200)) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000040)) 19:44:21 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) getpid() socket$nl_route(0x10, 0x3, 0x0) 19:44:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000140)) 19:44:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000200)=ANY=[], 0x0) 19:44:21 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ee}]}) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000000), &(0x7f0000000080)=0xfffffffffffffe52) [ 922.055705] audit: type=1326 audit(1529696661.054:2042): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25193 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:21 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) getpid() socket$nl_route(0x10, 0x3, 0x0) [ 922.112325] audit: type=1326 audit(1529696661.094:2043): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25198 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000140)) 19:44:21 executing program 6: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='proc\x00', 0x0, &(0x7f0000000200)) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000040)) 19:44:21 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) getpid() socket$nl_route(0x10, 0x3, 0x0) 19:44:21 executing program 0: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00'}, 0x10) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000000), &(0x7f0000000080)=0xfffffffffffffe52) 19:44:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket(0x0, 0x0, 0x0) rt_sigaction(0x0, &(0x7f0000000000), &(0x7f0000000040), 0x8, &(0x7f0000000080)) [ 922.404274] audit: type=1326 audit(1529696661.402:2044): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25216 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000140)) 19:44:21 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='proc\x00', 0x0, &(0x7f0000000200)) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000040)) 19:44:21 executing program 0: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00'}, 0x10) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000000), &(0x7f0000000080)=0xfffffffffffffe52) 19:44:21 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) getpid() socket$nl_route(0x10, 0x3, 0x0) 19:44:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='proc\x00', 0x0, &(0x7f0000000200)) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000040)) 19:44:22 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000080)) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000140)) 19:44:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000980)={0x10}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a00)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 19:44:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000200)=ANY=[], 0x0) 19:44:22 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) getpid() socket$nl_route(0x10, 0x3, 0x0) 19:44:22 executing program 0: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00'}, 0x10) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000000), &(0x7f0000000080)=0xfffffffffffffe52) [ 923.043456] audit: type=1326 audit(1529696662.042:2045): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25238 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f00000069c0)) 19:44:22 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000080)) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000140)) 19:44:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='proc\x00', 0x0, &(0x7f0000000200)) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000040)) 19:44:22 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) getpid() socket$nl_route(0x10, 0x3, 0x0) 19:44:22 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ee}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00'}, 0x10) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000000), &(0x7f0000000080)=0xfffffffffffffe52) 19:44:22 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000080)) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000140)) 19:44:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='proc\x00', 0x0, &(0x7f0000000200)) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000040)) 19:44:22 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) getpid() socket$nl_route(0x10, 0x3, 0x0) 19:44:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f00000069c0)) 19:44:22 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ee}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00'}, 0x10) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000000), &(0x7f0000000080)=0xfffffffffffffe52) 19:44:22 executing program 3: io_submit(0x0, 0x1ffffffffffffe8b, &(0x7f0000000040)) 19:44:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='proc\x00', 0x0, &(0x7f0000000200)) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000040)) 19:44:22 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) seccomp(0x0, 0x0, &(0x7f0000000080)) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000140)) 19:44:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000200)=ANY=[], 0x0) 19:44:22 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ee}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00'}, 0x10) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000000), &(0x7f0000000080)=0xfffffffffffffe52) 19:44:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f00000069c0)) 19:44:22 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) getpid() socket$nl_route(0x10, 0x3, 0x0) 19:44:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='proc\x00', 0x0, &(0x7f0000000200)) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000040)) 19:44:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) 19:44:23 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) seccomp(0x0, 0x0, &(0x7f0000000080)) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000140)) 19:44:23 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000040)="295ee1311f16f477671070") ioctl$sock_inet6_SIOCDELRT(r0, 0x2, &(0x7f00000001c0)={@remote={0xfe, 0x80, [], 0xbb}, @empty, @local={0xfe, 0x80, [], 0xaa}}) 19:44:23 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) seccomp(0x0, 0x0, &(0x7f0000000080)) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000140)) 19:44:23 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00'}, 0x10) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000000), &(0x7f0000000080)=0xfffffffffffffe52) 19:44:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='proc\x00', 0x0, &(0x7f0000000200)) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000040)) 19:44:23 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) getpid() socket$nl_route(0x10, 0x3, 0x0) 19:44:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f00000069c0)) 19:44:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/234, &(0x7f00000000c0)=0xea) 19:44:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) seccomp(0x0, 0x0, &(0x7f0000000080)) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000140)) 19:44:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) 19:44:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f00000069c0)) 19:44:23 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) getpid() socket$nl_route(0x10, 0x3, 0x0) 19:44:23 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00'}, 0x10) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000000), &(0x7f0000000080)=0xfffffffffffffe52) 19:44:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/234, &(0x7f00000000c0)=0xea) 19:44:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) 19:44:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) seccomp(0x0, 0x0, &(0x7f0000000080)) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000140)) 19:44:23 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) flock(0xffffffffffffffff, 0x0) 19:44:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) seccomp(0x0, 0x0, &(0x7f0000000080)) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000140)) 19:44:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00'}, 0x10) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000000), &(0x7f0000000080)=0xfffffffffffffe52) 19:44:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) 19:44:24 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='proc\x00', 0x0, &(0x7f0000000200)) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000040)) 19:44:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f00000069c0)) 19:44:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/234, &(0x7f00000000c0)=0xea) 19:44:24 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) flock(0xffffffffffffffff, 0x0) 19:44:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) seccomp(0x0, 0x0, &(0x7f0000000080)) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000140)) 19:44:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ee}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00'}, 0x10) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000000), &(0x7f0000000080)=0xfffffffffffffe52) 19:44:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) [ 925.338820] kauditd_printk_skb: 4 callbacks suppressed [ 925.338844] audit: type=1326 audit(1529696664.337:2050): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25386 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:24 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) getpid() socket$nl_route(0x10, 0x3, 0x0) 19:44:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ee}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00'}, 0x10) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000000), &(0x7f0000000080)=0xfffffffffffffe52) 19:44:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f00000069c0)) 19:44:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) seccomp(0x0, 0x0, &(0x7f0000000080)) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000140)) 19:44:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/234, &(0x7f00000000c0)=0xea) 19:44:24 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) flock(0xffffffffffffffff, 0x0) 19:44:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) [ 925.891175] audit: type=1326 audit(1529696664.889:2051): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25399 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:25 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f00000069c0)) 19:44:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) seccomp(0x0, 0x0, &(0x7f0000000080)) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000140)) 19:44:25 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='proc\x00', 0x0, &(0x7f0000000200)) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000040)) 19:44:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ee}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00'}, 0x10) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000000), &(0x7f0000000080)=0xfffffffffffffe52) 19:44:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) 19:44:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/234, &(0x7f00000000c0)=0xea) 19:44:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) flock(0xffffffffffffffff, 0x0) 19:44:25 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f00000069c0)) 19:44:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000080)) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000140)) [ 926.268358] audit: type=1326 audit(1529696665.267:2052): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25428 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 926.327086] audit: type=1326 audit(1529696665.314:2053): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25440 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:25 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f00000069c0)) 19:44:25 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) getpid() socket$nl_route(0x10, 0x3, 0x0) 19:44:25 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) 19:44:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/234, &(0x7f00000000c0)=0xea) 19:44:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) flock(0xffffffffffffffff, 0x0) 19:44:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00'}, 0x10) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000000), &(0x7f0000000080)=0xfffffffffffffe52) [ 926.842917] audit: type=1326 audit(1529696665.841:2054): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25452 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:25 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) 19:44:25 executing program 2: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f00000069c0)) 19:44:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) flock(0xffffffffffffffff, 0x0) [ 926.924490] audit: type=1326 audit(1529696665.873:2055): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25449 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000080)) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000140)) 19:44:26 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) 19:44:26 executing program 2: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f00000069c0)) 19:44:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/234, &(0x7f00000000c0)=0xea) 19:44:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) flock(0xffffffffffffffff, 0x0) 19:44:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fb}]}) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f00000000c0)) [ 927.269847] audit: type=1326 audit(1529696666.268:2056): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25480 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:26 executing program 2: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f00000069c0)) 19:44:26 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/234, &(0x7f00000000c0)=0xea) 19:44:26 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/234, &(0x7f00000000c0)=0xea) 19:44:26 executing program 4: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) flock(0xffffffffffffffff, 0x0) 19:44:26 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001fc0)='net/rt_acct\x00') syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000003d40)='ns/pid_for_children\x00') 19:44:26 executing program 5: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) 19:44:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f00000069c0)) 19:44:26 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00'}, 0x10) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000000), &(0x7f0000000080)=0xfffffffffffffe52) 19:44:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000001100)='/dev/rtc0\x00', 0x0, 0x0) 19:44:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f00000069c0)) [ 927.853176] audit: type=1326 audit(1529696666.851:2057): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25517 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:27 executing program 4: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) flock(0xffffffffffffffff, 0x0) 19:44:27 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001fc0)='net/rt_acct\x00') syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000003d40)='ns/pid_for_children\x00') 19:44:27 executing program 5: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) 19:44:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000001100)='/dev/rtc0\x00', 0x0, 0x0) 19:44:27 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/234, &(0x7f00000000c0)=0xea) 19:44:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f00000069c0)) 19:44:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000080)) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000140)) 19:44:27 executing program 4: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) flock(0xffffffffffffffff, 0x0) [ 928.261044] audit: type=1326 audit(1529696667.259:2058): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25545 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f00000069c0)) 19:44:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000001100)='/dev/rtc0\x00', 0x0, 0x0) 19:44:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00'}, 0x10) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000000), &(0x7f0000000080)=0xfffffffffffffe52) 19:44:27 executing program 5: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) 19:44:27 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/234, &(0x7f00000000c0)=0xea) 19:44:27 executing program 4: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) flock(0xffffffffffffffff, 0x0) 19:44:27 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001fc0)='net/rt_acct\x00') syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000003d40)='ns/pid_for_children\x00') 19:44:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f00000069c0)) 19:44:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000001100)='/dev/rtc0\x00', 0x0, 0x0) [ 928.799743] audit: type=1326 audit(1529696667.798:2059): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25565 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:28 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/234, &(0x7f00000000c0)=0xea) 19:44:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) 19:44:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f00000069c0)) 19:44:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f7}]}) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) connect(0xffffffffffffffff, &(0x7f0000000180)=@vsock={0x28, 0x0, 0x0, @any=0xffffffff}, 0x80) 19:44:28 executing program 4: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) flock(0xffffffffffffffff, 0x0) 19:44:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000001100)='/dev/rtc0\x00', 0x0, 0x0) 19:44:28 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) pipe(&(0x7f0000000040)) delete_module(&(0x7f0000000180)='\x00', 0x0) 19:44:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f00000069c0)) 19:44:28 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/234, &(0x7f00000000c0)=0xea) 19:44:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040)) openat$md(0xffffffffffffff9c, &(0x7f0000001080)='/dev/md0\x00', 0x0, 0x0) 19:44:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000001100)='/dev/rtc0\x00', 0x0, 0x0) 19:44:28 executing program 4: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) flock(0xffffffffffffffff, 0x0) 19:44:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) 19:44:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/234, &(0x7f00000000c0)=0xea) 19:44:28 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) pipe(&(0x7f0000000040)) delete_module(&(0x7f0000000180)='\x00', 0x0) 19:44:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/cgroup\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:44:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) 19:44:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000001100)='/dev/rtc0\x00', 0x0, 0x0) 19:44:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/234, &(0x7f00000000c0)=0xea) 19:44:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) flock(0xffffffffffffffff, 0x0) 19:44:28 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) pipe(&(0x7f0000000040)) delete_module(&(0x7f0000000180)='\x00', 0x0) 19:44:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/cgroup\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:44:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040)) openat$md(0xffffffffffffff9c, &(0x7f0000001080)='/dev/md0\x00', 0x0, 0x0) 19:44:29 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) flock(0xffffffffffffffff, 0x0) 19:44:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/cgroup\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:44:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) 19:44:29 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) pipe(&(0x7f0000000040)) delete_module(&(0x7f0000000180)='\x00', 0x0) 19:44:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040)) openat$md(0xffffffffffffff9c, &(0x7f0000001080)='/dev/md0\x00', 0x0, 0x0) 19:44:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/234, &(0x7f00000000c0)=0xea) 19:44:29 executing program 7: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000001100)='/dev/rtc0\x00', 0x0, 0x0) 19:44:29 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f00000069c0)) 19:44:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/234, &(0x7f00000000c0)=0xea) 19:44:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) 19:44:29 executing program 7: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000001100)='/dev/rtc0\x00', 0x0, 0x0) 19:44:29 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) flock(0xffffffffffffffff, 0x0) 19:44:29 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) delete_module(&(0x7f0000000180)='\x00', 0x0) 19:44:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/cgroup\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:44:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040)) openat$md(0xffffffffffffff9c, &(0x7f0000001080)='/dev/md0\x00', 0x0, 0x0) 19:44:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/234, &(0x7f00000000c0)=0xea) 19:44:29 executing program 7: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000001100)='/dev/rtc0\x00', 0x0, 0x0) 19:44:30 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f00000069c0)) 19:44:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) 19:44:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) flock(0xffffffffffffffff, 0x0) 19:44:30 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) delete_module(&(0x7f0000000180)='\x00', 0x0) 19:44:30 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:44:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/234, &(0x7f00000000c0)=0xea) 19:44:30 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) openat$md(0xffffffffffffff9c, &(0x7f0000001080)='/dev/md0\x00', 0x0, 0x0) 19:44:30 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000001100)='/dev/rtc0\x00', 0x0, 0x0) 19:44:30 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000001100)='/dev/rtc0\x00', 0x0, 0x0) [ 931.324886] kauditd_printk_skb: 2 callbacks suppressed [ 931.324910] audit: type=1326 audit(1529696670.323:2062): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25728 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/234, &(0x7f00000000c0)=0xea) 19:44:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) 19:44:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) flock(0xffffffffffffffff, 0x0) 19:44:30 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) delete_module(&(0x7f0000000180)='\x00', 0x0) 19:44:30 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) openat$md(0xffffffffffffff9c, &(0x7f0000001080)='/dev/md0\x00', 0x0, 0x0) 19:44:30 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 931.477894] audit: type=1326 audit(1529696670.453:2063): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25733 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:30 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000001100)='/dev/rtc0\x00', 0x0, 0x0) [ 931.608930] audit: type=1326 audit(1529696670.546:2064): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25739 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:31 executing program 6: pipe(&(0x7f0000000040)) delete_module(&(0x7f0000000180)='\x00', 0x0) 19:44:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) flock(0xffffffffffffffff, 0x0) 19:44:31 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:44:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) openat$md(0xffffffffffffff9c, &(0x7f0000001080)='/dev/md0\x00', 0x0, 0x0) 19:44:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000001100)='/dev/rtc0\x00', 0x0, 0x0) 19:44:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) 19:44:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000001100)='/dev/rtc0\x00', 0x0, 0x0) 19:44:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) flock(0xffffffffffffffff, 0x0) 19:44:31 executing program 6: pipe(&(0x7f0000000040)) delete_module(&(0x7f0000000180)='\x00', 0x0) [ 932.429834] audit: type=1326 audit(1529696671.428:2065): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25779 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/234, &(0x7f00000000c0)=0xea) 19:44:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) 19:44:31 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/cgroup\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:44:31 executing program 1: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040)) openat$md(0xffffffffffffff9c, &(0x7f0000001080)='/dev/md0\x00', 0x0, 0x0) 19:44:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) 19:44:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000001100)='/dev/rtc0\x00', 0x0, 0x0) [ 932.538730] audit: type=1326 audit(1529696671.537:2066): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25788 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:31 executing program 6: pipe(&(0x7f0000000040)) delete_module(&(0x7f0000000180)='\x00', 0x0) [ 932.603741] audit: type=1326 audit(1529696671.580:2067): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25791 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:31 executing program 1: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040)) openat$md(0xffffffffffffff9c, &(0x7f0000001080)='/dev/md0\x00', 0x0, 0x0) 19:44:31 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/cgroup\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:44:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) 19:44:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000001100)='/dev/rtc0\x00', 0x0, 0x0) 19:44:31 executing program 1: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040)) openat$md(0xffffffffffffff9c, &(0x7f0000001080)='/dev/md0\x00', 0x0, 0x0) 19:44:31 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) pipe(&(0x7f0000000040)) delete_module(&(0x7f0000000180)='\x00', 0x0) 19:44:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000001100)='/dev/rtc0\x00', 0x0, 0x0) 19:44:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) flock(0xffffffffffffffff, 0x0) 19:44:32 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/cgroup\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 933.351656] audit: type=1326 audit(1529696672.350:2068): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25835 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:32 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/cgroup\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:44:32 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/234, &(0x7f00000000c0)=0xea) 19:44:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) 19:44:32 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) pipe(&(0x7f0000000040)) delete_module(&(0x7f0000000180)='\x00', 0x0) 19:44:32 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040)) openat$md(0xffffffffffffff9c, &(0x7f0000001080)='/dev/md0\x00', 0x0, 0x0) 19:44:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) 19:44:32 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000001100)='/dev/rtc0\x00', 0x0, 0x0) [ 933.565030] audit: type=1326 audit(1529696672.563:2069): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25844 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:32 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) pipe(&(0x7f0000000040)) delete_module(&(0x7f0000000180)='\x00', 0x0) [ 933.630317] audit: type=1326 audit(1529696672.590:2070): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25851 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:32 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/cgroup\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:44:32 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040)) openat$md(0xffffffffffffff9c, &(0x7f0000001080)='/dev/md0\x00', 0x0, 0x0) 19:44:32 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000001100)='/dev/rtc0\x00', 0x0, 0x0) 19:44:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) 19:44:32 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) pipe(&(0x7f0000000040)) delete_module(&(0x7f0000000180)='\x00', 0x0) [ 933.798519] audit: type=1326 audit(1529696672.797:2071): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25865 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:32 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/cgroup\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:44:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) flock(0xffffffffffffffff, 0x0) 19:44:33 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040)) openat$md(0xffffffffffffff9c, &(0x7f0000001080)='/dev/md0\x00', 0x0, 0x0) 19:44:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) 19:44:33 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000006c0)}) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/cgroup\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:44:33 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) pipe(&(0x7f0000000040)) delete_module(&(0x7f0000000180)='\x00', 0x0) 19:44:33 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) pipe(&(0x7f0000000040)) delete_module(&(0x7f0000000180)='\x00', 0x0) 19:44:33 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) pipe(&(0x7f0000000040)) delete_module(&(0x7f0000000180)='\x00', 0x0) 19:44:33 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000006c0)}) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/cgroup\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:44:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040)) openat$md(0xffffffffffffff9c, &(0x7f0000001080)='/dev/md0\x00', 0x0, 0x0) 19:44:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) 19:44:33 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) pipe(&(0x7f0000000040)) delete_module(&(0x7f0000000180)='\x00', 0x0) 19:44:33 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000006c0)}) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/cgroup\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:44:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040)) openat$md(0xffffffffffffff9c, &(0x7f0000001080)='/dev/md0\x00', 0x0, 0x0) 19:44:33 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000001100)='/dev/rtc0\x00', 0x0, 0x0) 19:44:33 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) pipe(&(0x7f0000000040)) delete_module(&(0x7f0000000180)='\x00', 0x0) 19:44:33 executing program 2: ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) 19:44:34 executing program 2: ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) 19:44:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023d}]}) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/cgroup\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:44:34 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) pipe(&(0x7f0000000040)) delete_module(&(0x7f0000000180)='\x00', 0x0) 19:44:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040)) openat$md(0xffffffffffffff9c, &(0x7f0000001080)='/dev/md0\x00', 0x0, 0x0) 19:44:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040)) openat$md(0xffffffffffffff9c, &(0x7f0000001080)='/dev/md0\x00', 0x0, 0x0) 19:44:34 executing program 2: ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) 19:44:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023d}]}) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/cgroup\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:44:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040)) openat$md(0xffffffffffffff9c, &(0x7f0000001080)='/dev/md0\x00', 0x0, 0x0) 19:44:34 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) 19:44:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023d}]}) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/cgroup\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:44:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040)) openat$md(0xffffffffffffff9c, &(0x7f0000001080)='/dev/md0\x00', 0x0, 0x0) 19:44:34 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) 19:44:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6}]}) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/cgroup\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:44:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000001100)='/dev/rtc0\x00', 0x0, 0x0) 19:44:34 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) 19:44:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040)) openat$md(0xffffffffffffff9c, &(0x7f0000001080)='/dev/md0\x00', 0x0, 0x0) 19:44:34 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000006c0)}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) 19:44:34 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000006c0)}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) 19:44:35 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) pipe(&(0x7f0000000040)) delete_module(&(0x7f0000000180)='\x00', 0x0) 19:44:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000006c0)}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) 19:44:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50249}]}) seccomp(0x0, 0x0, &(0x7f00000004c0)={0x28f, &(0x7f0000000040)}) keyctl$describe(0x6, 0x0, &(0x7f0000000240)=""/89, 0x59) 19:44:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10) 19:44:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) 19:44:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023d}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) 19:44:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023d}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) 19:44:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50249}]}) seccomp(0x0, 0x0, &(0x7f00000004c0)={0x28f, &(0x7f0000000040)}) keyctl$describe(0x6, 0x0, &(0x7f0000000240)=""/89, 0x59) 19:44:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023d}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) 19:44:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) 19:44:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6}]}) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/cgroup\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 936.601130] kauditd_printk_skb: 7 callbacks suppressed [ 936.601151] audit: type=1326 audit(1529696675.599:2079): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26022 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10) 19:44:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50249}]}) seccomp(0x0, 0x0, &(0x7f00000004c0)={0x28f, &(0x7f0000000040)}) keyctl$describe(0x6, 0x0, &(0x7f0000000240)=""/89, 0x59) 19:44:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) 19:44:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) 19:44:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040)) openat$md(0xffffffffffffff9c, &(0x7f0000001080)='/dev/md0\x00', 0x0, 0x0) [ 936.727455] audit: type=1326 audit(1529696675.726:2080): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26032 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 936.774590] audit: type=1326 audit(1529696675.749:2081): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26034 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:36 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) pipe(&(0x7f0000000040)) delete_module(&(0x7f0000000180)='\x00', 0x0) 19:44:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x14) 19:44:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) 19:44:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50249}]}) seccomp(0x0, 0x0, &(0x7f00000004c0)={0x28f, &(0x7f0000000040)}) keyctl$describe(0x6, 0x0, &(0x7f0000000240)=""/89, 0x59) 19:44:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10) [ 937.189336] audit: type=1326 audit(1529696676.188:2082): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26043 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) syncfs(0xffffffffffffffff) 19:44:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50249}]}) keyctl$describe(0x6, 0x0, &(0x7f0000000240)=""/89, 0x59) 19:44:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10) 19:44:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) 19:44:36 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6}]}) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/cgroup\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:44:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10) 19:44:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50249}]}) keyctl$describe(0x6, 0x0, &(0x7f0000000240)=""/89, 0x59) 19:44:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) syncfs(0xffffffffffffffff) [ 937.629490] audit: type=1326 audit(1529696676.628:2083): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26073 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) 19:44:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) 19:44:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040)) openat$md(0xffffffffffffff9c, &(0x7f0000001080)='/dev/md0\x00', 0x0, 0x0) 19:44:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10) 19:44:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50249}]}) keyctl$describe(0x6, 0x0, &(0x7f0000000240)=""/89, 0x59) [ 937.828090] audit: type=1326 audit(1529696676.826:2084): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26084 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) syncfs(0xffffffffffffffff) [ 937.909124] audit: type=1326 audit(1529696676.862:2085): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26089 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:37 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10) 19:44:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) 19:44:37 executing program 5: seccomp(0x0, 0x0, &(0x7f00000004c0)={0x28f, &(0x7f0000000040)}) keyctl$describe(0x6, 0x0, &(0x7f0000000240)=""/89, 0x59) 19:44:37 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) syncfs(0xffffffffffffffff) 19:44:37 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10) 19:44:37 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000200)}) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 19:44:37 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) syncfs(0xffffffffffffffff) 19:44:37 executing program 5: seccomp(0x0, 0x0, &(0x7f00000004c0)={0x28f, &(0x7f0000000040)}) keyctl$describe(0x6, 0x0, &(0x7f0000000240)=""/89, 0x59) 19:44:37 executing program 4: openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) 19:44:37 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10) 19:44:37 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10) 19:44:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) 19:44:37 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000200)}) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 19:44:37 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getresuid(&(0x7f0000000100), &(0x7f0000000180), &(0x7f00000001c0)) 19:44:37 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) syncfs(0xffffffffffffffff) 19:44:37 executing program 5: seccomp(0x0, 0x0, &(0x7f00000004c0)={0x28f, &(0x7f0000000040)}) keyctl$describe(0x6, 0x0, &(0x7f0000000240)=""/89, 0x59) 19:44:37 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) 19:44:37 executing program 4: openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) [ 938.829246] audit: type=1326 audit(1529696677.827:2086): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26156 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:37 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50249}]}) seccomp(0x0, 0x0, &(0x7f00000004c0)={0x28f, &(0x7f0000000040)}) keyctl$describe(0x6, 0x0, &(0x7f0000000240)=""/89, 0x59) 19:44:37 executing program 4: openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) 19:44:37 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10) 19:44:37 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) syncfs(0xffffffffffffffff) 19:44:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getresuid(&(0x7f0000000100), &(0x7f0000000180), &(0x7f00000001c0)) 19:44:38 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000200)}) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 19:44:38 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10) 19:44:38 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50249}]}) seccomp(0x0, 0x0, &(0x7f00000004c0)={0x28f, &(0x7f0000000040)}) keyctl$describe(0x6, 0x0, &(0x7f0000000240)=""/89, 0x59) 19:44:38 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) 19:44:38 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50249}]}) seccomp(0x0, 0x0, &(0x7f00000004c0)={0x28f, &(0x7f0000000040)}) keyctl$describe(0x6, 0x0, &(0x7f0000000240)=""/89, 0x59) 19:44:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) 19:44:38 executing program 7: ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) syncfs(0xffffffffffffffff) 19:44:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getresuid(&(0x7f0000000100), &(0x7f0000000180), &(0x7f00000001c0)) 19:44:38 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000200)}) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 19:44:38 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10) 19:44:38 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) 19:44:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x4) 19:44:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f00000004c0)={0x28f, &(0x7f0000000040)}) keyctl$describe(0x6, 0x0, &(0x7f0000000240)=""/89, 0x59) 19:44:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10) 19:44:38 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) 19:44:38 executing program 7: ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) syncfs(0xffffffffffffffff) 19:44:38 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 19:44:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) 19:44:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getresuid(&(0x7f0000000100), &(0x7f0000000180), &(0x7f00000001c0)) 19:44:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f00000004c0)={0x28f, &(0x7f0000000040)}) keyctl$describe(0x6, 0x0, &(0x7f0000000240)=""/89, 0x59) 19:44:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) 19:44:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x4) 19:44:39 executing program 7: ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) syncfs(0xffffffffffffffff) 19:44:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10) 19:44:39 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 19:44:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) 19:44:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) getresuid(&(0x7f0000000100), &(0x7f0000000180), &(0x7f00000001c0)) 19:44:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f00000004c0)={0x28f, &(0x7f0000000040)}) keyctl$describe(0x6, 0x0, &(0x7f0000000240)=""/89, 0x59) 19:44:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) 19:44:39 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) syncfs(0xffffffffffffffff) 19:44:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x4) 19:44:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10) 19:44:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50249}]}) seccomp(0x0, 0x0, &(0x7f00000004c0)={0x28f, &(0x7f0000000040)}) keyctl$describe(0x6, 0x0, &(0x7f0000000240)=""/89, 0x59) 19:44:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) getresuid(&(0x7f0000000100), &(0x7f0000000180), &(0x7f00000001c0)) 19:44:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) 19:44:39 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 19:44:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) 19:44:39 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) syncfs(0xffffffffffffffff) 19:44:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x4) 19:44:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10) 19:44:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) 19:44:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50249}]}) seccomp(0x0, 0x0, &(0x7f00000004c0)={0x28f, &(0x7f0000000040)}) keyctl$describe(0x6, 0x0, &(0x7f0000000240)=""/89, 0x59) 19:44:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) 19:44:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) getresuid(&(0x7f0000000100), &(0x7f0000000180), &(0x7f00000001c0)) 19:44:39 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) syncfs(0xffffffffffffffff) 19:44:39 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000200)}) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 19:44:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10) 19:44:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50249}]}) seccomp(0x0, 0x0, &(0x7f00000004c0)={0x28f, &(0x7f0000000040)}) keyctl$describe(0x6, 0x0, &(0x7f0000000240)=""/89, 0x59) 19:44:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) 19:44:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x4) 19:44:40 executing program 0: dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getresuid(&(0x7f0000000100), &(0x7f0000000180), &(0x7f00000001c0)) 19:44:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) 19:44:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000006c0)}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) syncfs(0xffffffffffffffff) 19:44:40 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000200)}) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 19:44:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10) 19:44:40 executing program 0: dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getresuid(&(0x7f0000000100), &(0x7f0000000180), &(0x7f00000001c0)) 19:44:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000004c0)={0x28f, &(0x7f0000000040)}) keyctl$describe(0x6, 0x0, &(0x7f0000000240)=""/89, 0x59) 19:44:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) 19:44:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x4) 19:44:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000006c0)}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) syncfs(0xffffffffffffffff) 19:44:40 executing program 1: openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) 19:44:40 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000200)}) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 19:44:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10) [ 941.488822] audit: type=1326 audit(1529696680.487:2087): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26353 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:40 executing program 0: dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getresuid(&(0x7f0000000100), &(0x7f0000000180), &(0x7f00000001c0)) 19:44:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) 19:44:40 executing program 1: openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) [ 941.610963] audit: type=1326 audit(1529696680.609:2088): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26363 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x4) 19:44:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000006c0)}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) syncfs(0xffffffffffffffff) [ 941.729428] audit: type=1326 audit(1529696680.726:2089): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26368 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:40 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000200)}) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 19:44:40 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getresuid(&(0x7f0000000100), &(0x7f0000000180), &(0x7f00000001c0)) 19:44:40 executing program 1: openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) 19:44:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023d}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) syncfs(0xffffffffffffffff) 19:44:41 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getresuid(&(0x7f0000000100), &(0x7f0000000180), &(0x7f00000001c0)) 19:44:41 executing program 1: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) 19:44:41 executing program 2: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x4) 19:44:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000004c0)={0x28f, &(0x7f0000000040)}) keyctl$describe(0x6, 0x0, &(0x7f0000000240)=""/89, 0x59) 19:44:41 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023d}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) syncfs(0xffffffffffffffff) 19:44:41 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000200)}) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) [ 942.458957] audit: type=1326 audit(1529696681.457:2090): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26411 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:41 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10) 19:44:41 executing program 1: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) 19:44:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) 19:44:41 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023d}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) syncfs(0xffffffffffffffff) 19:44:41 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000200)}) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 19:44:41 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getresuid(&(0x7f0000000100), &(0x7f0000000180), &(0x7f00000001c0)) 19:44:41 executing program 2: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x4) [ 942.626834] audit: type=1326 audit(1529696681.625:2091): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26421 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:41 executing program 1: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) 19:44:41 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000200)}) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) [ 942.712886] audit: type=1326 audit(1529696681.711:2092): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26433 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:41 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000006c0)}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getresuid(&(0x7f0000000100), &(0x7f0000000180), &(0x7f00000001c0)) 19:44:41 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) syncfs(0xffffffffffffffff) [ 942.860080] audit: type=1326 audit(1529696681.858:2093): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26446 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:42 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000200)}) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 19:44:42 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000006c0)}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getresuid(&(0x7f0000000100), &(0x7f0000000180), &(0x7f00000001c0)) 19:44:42 executing program 2: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x4) 19:44:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000004c0)={0x28f, &(0x7f0000000040)}) keyctl$describe(0x6, 0x0, &(0x7f0000000240)=""/89, 0x59) 19:44:42 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) [ 943.427292] audit: type=1326 audit(1529696682.425:2094): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26461 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10) 19:44:42 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000006c0)}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getresuid(&(0x7f0000000100), &(0x7f0000000180), &(0x7f00000001c0)) 19:44:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) 19:44:42 executing program 2: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x4) 19:44:42 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) 19:44:42 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000200)}) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 19:44:42 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023d}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getresuid(&(0x7f0000000100), &(0x7f0000000180), &(0x7f00000001c0)) [ 943.579811] audit: type=1326 audit(1529696682.578:2095): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26472 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:42 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023d}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getresuid(&(0x7f0000000100), &(0x7f0000000180), &(0x7f00000001c0)) 19:44:42 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000200)}) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) [ 943.706589] audit: type=1326 audit(1529696682.705:2096): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26485 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:42 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) 19:44:42 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) syncfs(0xffffffffffffffff) 19:44:42 executing program 2: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x4) [ 943.903747] audit: type=1326 audit(1529696682.902:2097): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26497 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:43 executing program 2: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x4) 19:44:43 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000200)}) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 19:44:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) 19:44:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023d}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getresuid(&(0x7f0000000100), &(0x7f0000000180), &(0x7f00000001c0)) 19:44:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getresuid(&(0x7f0000000100), &(0x7f0000000180), &(0x7f00000001c0)) 19:44:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) 19:44:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) unlinkat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) 19:44:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket(0x0, 0x0, 0x0) sched_setparam(0x0, &(0x7f0000000000)) 19:44:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) 19:44:43 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000200)}) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 19:44:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x4) 19:44:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x4) 19:44:43 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000200)}) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 19:44:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) 19:44:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6}]}) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) syncfs(0xffffffffffffffff) 19:44:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) unlinkat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) 19:44:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x4) 19:44:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) eventfd(0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000000)=@random={'trusted.', 'eth1\x00'}, &(0x7f0000000040)=""/199, 0xc7) 19:44:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f7}]}) socket$inet(0x2, 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(0xffffffffffffffff, 0x227f, &(0x7f0000000580)) 19:44:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) 19:44:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getresuid(&(0x7f0000000100), &(0x7f0000000180), &(0x7f00000001c0)) 19:44:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x4) 19:44:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f7}]}) socket$inet(0x2, 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(0xffffffffffffffff, 0x227f, &(0x7f0000000580)) 19:44:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) eventfd(0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000000)=@random={'trusted.', 'eth1\x00'}, &(0x7f0000000040)=""/199, 0xc7) 19:44:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) unlinkat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) 19:44:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x4) 19:44:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) eventfd(0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000000)=@random={'trusted.', 'eth1\x00'}, &(0x7f0000000040)=""/199, 0xc7) 19:44:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x4) 19:44:44 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000200)}) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 19:44:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f7}]}) socket$inet(0x2, 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(0xffffffffffffffff, 0x227f, &(0x7f0000000580)) 19:44:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x4) 19:44:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) unlinkat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) 19:44:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) eventfd(0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000000)=@random={'trusted.', 'eth1\x00'}, &(0x7f0000000040)=""/199, 0xc7) 19:44:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f7}]}) socket$inet(0x2, 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(0xffffffffffffffff, 0x227f, &(0x7f0000000580)) 19:44:44 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) request_key(&(0x7f0000000100)='pkcs7_test\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a}, &(0x7f0000000380)='\x00', 0xfffffffffffffffd) inotify_init() 19:44:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) unlinkat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) 19:44:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) fgetxattr(0xffffffffffffffff, &(0x7f0000000000)=@random={'trusted.', 'eth1\x00'}, &(0x7f0000000040)=""/199, 0xc7) 19:44:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getresuid(&(0x7f0000000100), &(0x7f0000000180), &(0x7f00000001c0)) 19:44:45 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) request_key(&(0x7f0000000100)='pkcs7_test\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a}, &(0x7f0000000380)='\x00', 0xfffffffffffffffd) inotify_init() 19:44:45 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f7}]}) ioctl$SG_GET_SG_TABLESIZE(0xffffffffffffffff, 0x227f, &(0x7f0000000580)) 19:44:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) unlinkat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) 19:44:45 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) 19:44:45 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f7}]}) ioctl$SG_GET_SG_TABLESIZE(0xffffffffffffffff, 0x227f, &(0x7f0000000580)) 19:44:45 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) request_key(&(0x7f0000000100)='pkcs7_test\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a}, &(0x7f0000000380)='\x00', 0xfffffffffffffffd) inotify_init() 19:44:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) unlinkat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) 19:44:45 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000200)}) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) [ 946.793816] kauditd_printk_skb: 9 callbacks suppressed [ 946.793843] audit: type=1326 audit(1529696685.792:2107): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26657 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:45 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f7}]}) ioctl$SG_GET_SG_TABLESIZE(0xffffffffffffffff, 0x227f, &(0x7f0000000580)) 19:44:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) fgetxattr(0xffffffffffffffff, &(0x7f0000000000)=@random={'trusted.', 'eth1\x00'}, &(0x7f0000000040)=""/199, 0xc7) 19:44:45 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) request_key(&(0x7f0000000100)='pkcs7_test\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a}, &(0x7f0000000380)='\x00', 0xfffffffffffffffd) inotify_init() 19:44:45 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) unlinkat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) 19:44:45 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x4) [ 946.975357] audit: type=1326 audit(1529696685.973:2108): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26669 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:46 executing program 4: socket$inet(0x2, 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(0xffffffffffffffff, 0x227f, &(0x7f0000000580)) 19:44:46 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) unlinkat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) 19:44:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) fgetxattr(0xffffffffffffffff, &(0x7f0000000000)=@random={'trusted.', 'eth1\x00'}, &(0x7f0000000040)=""/199, 0xc7) 19:44:46 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) inotify_init() 19:44:46 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) unlinkat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) 19:44:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) [ 947.429959] audit: type=1326 audit(1529696686.428:2109): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26689 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:46 executing program 5: eventfd(0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000000)=@random={'trusted.', 'eth1\x00'}, &(0x7f0000000040)=""/199, 0xc7) 19:44:46 executing program 4: socket$inet(0x2, 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(0xffffffffffffffff, 0x227f, &(0x7f0000000580)) 19:44:46 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) syz_open_dev$urandom(&(0x7f0000001140)='/dev/urandom\x00', 0x0, 0x0) syz_open_dev$urandom(&(0x7f00000012c0)='/dev/urandom\x00', 0x0, 0x0) 19:44:46 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) unlinkat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) 19:44:46 executing program 4: socket$inet(0x2, 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(0xffffffffffffffff, 0x227f, &(0x7f0000000580)) 19:44:46 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x4) 19:44:46 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) inotify_init() 19:44:46 executing program 5: eventfd(0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000000)=@random={'trusted.', 'eth1\x00'}, &(0x7f0000000040)=""/199, 0xc7) 19:44:46 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) unlinkat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) 19:44:46 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) syz_open_dev$urandom(&(0x7f0000001140)='/dev/urandom\x00', 0x0, 0x0) syz_open_dev$urandom(&(0x7f00000012c0)='/dev/urandom\x00', 0x0, 0x0) 19:44:46 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f7}]}) socket$inet(0x2, 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(0xffffffffffffffff, 0x227f, &(0x7f0000000580)) 19:44:46 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000180)) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000100), 0x0) [ 947.969395] audit: type=1326 audit(1529696686.968:2110): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26735 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:44:47 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) unlinkat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) 19:44:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) syz_open_dev$urandom(&(0x7f0000001140)='/dev/urandom\x00', 0x0, 0x0) syz_open_dev$urandom(&(0x7f00000012c0)='/dev/urandom\x00', 0x0, 0x0) 19:44:47 executing program 5: eventfd(0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000000)=@random={'trusted.', 'eth1\x00'}, &(0x7f0000000040)=""/199, 0xc7) 19:44:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) syz_open_dev$urandom(&(0x7f0000001140)='/dev/urandom\x00', 0x0, 0x0) syz_open_dev$urandom(&(0x7f00000012c0)='/dev/urandom\x00', 0x0, 0x0) 19:44:47 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) inotify_init() 19:44:47 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000180)) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000100), 0x0) 19:44:47 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f7}]}) socket$inet(0x2, 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(0xffffffffffffffff, 0x227f, &(0x7f0000000580)) 19:44:47 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) eventfd(0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000000)=@random={'trusted.', 'eth1\x00'}, &(0x7f0000000040)=""/199, 0xc7) 19:44:47 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) syz_open_dev$urandom(&(0x7f0000001140)='/dev/urandom\x00', 0x0, 0x0) syz_open_dev$urandom(&(0x7f00000012c0)='/dev/urandom\x00', 0x0, 0x0) [ 948.451622] device bridge_slave_1 left promiscuous mode [ 948.457617] bridge0: port 2(bridge_slave_1) entered disabled state [ 948.519614] device bridge_slave_0 left promiscuous mode [ 948.525376] bridge0: port 1(bridge_slave_0) entered disabled state [ 948.656190] team0 (unregistering): Port device team_slave_1 removed [ 948.686949] team0 (unregistering): Port device team_slave_0 removed [ 948.699717] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 948.714319] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 948.740100] bond0 (unregistering): Released all slaves 19:44:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) syz_open_dev$urandom(&(0x7f00000012c0)='/dev/urandom\x00', 0x0, 0x0) 19:44:47 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket$inet_icmp_raw(0x2, 0x3, 0x1) unlinkat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) 19:44:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f7}]}) syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000100)=""/24) 19:44:47 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) eventfd(0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000000)=@random={'trusted.', 'eth1\x00'}, &(0x7f0000000040)=""/199, 0xc7) 19:44:47 executing program 7: request_key(&(0x7f0000000100)='pkcs7_test\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a}, &(0x7f0000000380)='\x00', 0xfffffffffffffffd) inotify_init() 19:44:47 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f7}]}) socket$inet(0x2, 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(0xffffffffffffffff, 0x227f, &(0x7f0000000580)) 19:44:47 executing program 1: syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) times(&(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') 19:44:47 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000180)) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000100), 0x0) 19:44:48 executing program 7: request_key(&(0x7f0000000100)='pkcs7_test\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a}, &(0x7f0000000380)='\x00', 0xfffffffffffffffd) inotify_init() 19:44:48 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) eventfd(0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000000)=@random={'trusted.', 'eth1\x00'}, &(0x7f0000000040)=""/199, 0xc7) 19:44:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) syz_open_dev$urandom(&(0x7f00000012c0)='/dev/urandom\x00', 0x0, 0x0) 19:44:48 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000180)) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000100), 0x0) 19:44:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(0xffffffffffffffff, 0x227f, &(0x7f0000000580)) 19:44:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) 19:44:48 executing program 1: syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) times(&(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') 19:44:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000006c0)}) eventfd(0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000000)=@random={'trusted.', 'eth1\x00'}, &(0x7f0000000040)=""/199, 0xc7) 19:44:48 executing program 7: request_key(&(0x7f0000000100)='pkcs7_test\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a}, &(0x7f0000000380)='\x00', 0xfffffffffffffffd) inotify_init() [ 949.678224] IPVS: ftp: loaded support on port[0] = 21 [ 950.448776] bridge0: port 1(bridge_slave_0) entered blocking state [ 950.455247] bridge0: port 1(bridge_slave_0) entered disabled state [ 950.462655] device bridge_slave_0 entered promiscuous mode [ 950.505878] bridge0: port 2(bridge_slave_1) entered blocking state [ 950.512419] bridge0: port 2(bridge_slave_1) entered disabled state [ 950.520813] device bridge_slave_1 entered promiscuous mode [ 950.580520] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 950.642649] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 950.792574] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 950.831773] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 950.997123] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 951.004702] team0: Port device team_slave_0 added [ 951.040257] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 951.047517] team0: Port device team_slave_1 added 19:44:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) syz_open_dev$urandom(&(0x7f00000012c0)='/dev/urandom\x00', 0x0, 0x0) 19:44:50 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) request_key(&(0x7f0000000100)='pkcs7_test\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a}, &(0x7f0000000380)='\x00', 0xfffffffffffffffd) inotify_init() 19:44:50 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(0xffffffffffffffff, 0x227f, &(0x7f0000000580)) 19:44:50 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000100), 0x0) 19:44:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000006c0)}) eventfd(0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000000)=@random={'trusted.', 'eth1\x00'}, &(0x7f0000000040)=""/199, 0xc7) 19:44:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket$inet_icmp_raw(0x2, 0x3, 0x1) unlinkat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) 19:44:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) 19:44:50 executing program 1: syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) times(&(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') 19:44:50 executing program 0: syz_open_dev$urandom(&(0x7f0000001140)='/dev/urandom\x00', 0x0, 0x0) syz_open_dev$urandom(&(0x7f00000012c0)='/dev/urandom\x00', 0x0, 0x0) 19:44:50 executing program 0: syz_open_dev$urandom(&(0x7f0000001140)='/dev/urandom\x00', 0x0, 0x0) syz_open_dev$urandom(&(0x7f00000012c0)='/dev/urandom\x00', 0x0, 0x0) 19:44:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) 19:44:50 executing program 0: syz_open_dev$urandom(&(0x7f0000001140)='/dev/urandom\x00', 0x0, 0x0) syz_open_dev$urandom(&(0x7f00000012c0)='/dev/urandom\x00', 0x0, 0x0) [ 951.735627] device bridge_slave_1 left promiscuous mode [ 951.741449] bridge0: port 2(bridge_slave_1) entered disabled state 19:44:50 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) syz_open_dev$urandom(&(0x7f0000001140)='/dev/urandom\x00', 0x0, 0x0) syz_open_dev$urandom(&(0x7f00000012c0)='/dev/urandom\x00', 0x0, 0x0) [ 951.805023] device bridge_slave_0 left promiscuous mode [ 951.810822] bridge0: port 1(bridge_slave_0) entered disabled state 19:44:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000006c0)}) eventfd(0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000000)=@random={'trusted.', 'eth1\x00'}, &(0x7f0000000040)=""/199, 0xc7) 19:44:50 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(0xffffffffffffffff, 0x227f, &(0x7f0000000580)) 19:44:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket$inet_icmp_raw(0x2, 0x3, 0x1) unlinkat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) 19:44:50 executing program 1: syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) times(&(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') 19:44:50 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) request_key(&(0x7f0000000100)='pkcs7_test\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a}, &(0x7f0000000380)='\x00', 0xfffffffffffffffd) inotify_init() 19:44:51 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000100), 0x0) 19:44:51 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) syz_open_dev$urandom(&(0x7f0000001140)='/dev/urandom\x00', 0x0, 0x0) syz_open_dev$urandom(&(0x7f00000012c0)='/dev/urandom\x00', 0x0, 0x0) [ 951.991717] team0 (unregistering): Port device team_slave_1 removed [ 952.050422] team0 (unregistering): Port device team_slave_0 removed [ 952.111084] bond0 (unregistering): Releasing backup interface bond_slave_1 19:44:51 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) syz_open_dev$urandom(&(0x7f0000001140)='/dev/urandom\x00', 0x0, 0x0) syz_open_dev$urandom(&(0x7f00000012c0)='/dev/urandom\x00', 0x0, 0x0) [ 952.170065] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 952.327706] bond0 (unregistering): Released all slaves 19:44:51 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) syz_open_dev$urandom(&(0x7f0000001140)='/dev/urandom\x00', 0x0, 0x0) syz_open_dev$urandom(&(0x7f00000012c0)='/dev/urandom\x00', 0x0, 0x0) [ 952.518352] IPVS: ftp: loaded support on port[0] = 21 19:44:51 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) syz_open_dev$urandom(&(0x7f0000001140)='/dev/urandom\x00', 0x0, 0x0) syz_open_dev$urandom(&(0x7f00000012c0)='/dev/urandom\x00', 0x0, 0x0) 19:44:51 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) syz_open_dev$urandom(&(0x7f0000001140)='/dev/urandom\x00', 0x0, 0x0) syz_open_dev$urandom(&(0x7f00000012c0)='/dev/urandom\x00', 0x0, 0x0) [ 952.758784] IPVS: ftp: loaded support on port[0] = 21 [ 952.793600] IPVS: ftp: loaded support on port[0] = 21 [ 952.874146] IPVS: ftp: loaded support on port[0] = 21 [ 952.884153] IPVS: ftp: loaded support on port[0] = 21 [ 952.894714] IPVS: ftp: loaded support on port[0] = 21 19:44:51 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) syz_open_dev$urandom(&(0x7f0000001140)='/dev/urandom\x00', 0x0, 0x0) syz_open_dev$urandom(&(0x7f00000012c0)='/dev/urandom\x00', 0x0, 0x0) [ 952.948359] IPVS: ftp: loaded support on port[0] = 21 19:44:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) syz_open_dev$urandom(&(0x7f0000001140)='/dev/urandom\x00', 0x0, 0x0) syz_open_dev$urandom(&(0x7f00000012c0)='/dev/urandom\x00', 0x0, 0x0) [ 954.109916] IPVS: ftp: loaded support on port[0] = 21 [ 955.430997] device bridge_slave_1 left promiscuous mode [ 955.436746] bridge0: port 2(bridge_slave_1) entered disabled state [ 955.464934] device bridge_slave_0 left promiscuous mode [ 955.470745] bridge0: port 1(bridge_slave_0) entered disabled state [ 955.486678] device bridge_slave_1 left promiscuous mode [ 955.492434] bridge0: port 2(bridge_slave_1) entered disabled state [ 955.504940] device bridge_slave_0 left promiscuous mode [ 955.510701] bridge0: port 1(bridge_slave_0) entered disabled state [ 955.523687] device bridge_slave_1 left promiscuous mode [ 955.529423] bridge0: port 2(bridge_slave_1) entered disabled state [ 955.539947] device bridge_slave_0 left promiscuous mode [ 955.545690] bridge0: port 1(bridge_slave_0) entered disabled state [ 955.558607] device bridge_slave_1 left promiscuous mode [ 955.564349] bridge0: port 2(bridge_slave_1) entered disabled state [ 955.576950] device bridge_slave_0 left promiscuous mode [ 955.582734] bridge0: port 1(bridge_slave_0) entered disabled state [ 955.595708] device bridge_slave_1 left promiscuous mode [ 955.601469] bridge0: port 2(bridge_slave_1) entered disabled state [ 955.614023] device bridge_slave_0 left promiscuous mode [ 955.619793] bridge0: port 1(bridge_slave_0) entered disabled state [ 955.632585] device bridge_slave_1 left promiscuous mode [ 955.638350] bridge0: port 2(bridge_slave_1) entered disabled state [ 955.650952] device bridge_slave_0 left promiscuous mode [ 955.656752] bridge0: port 1(bridge_slave_0) entered disabled state [ 955.669606] device bridge_slave_1 left promiscuous mode [ 955.675351] bridge0: port 2(bridge_slave_1) entered disabled state [ 955.687919] device bridge_slave_0 left promiscuous mode [ 955.693657] bridge0: port 1(bridge_slave_0) entered disabled state [ 955.851486] team0 (unregistering): Port device team_slave_1 removed [ 955.862506] team0 (unregistering): Port device team_slave_0 removed [ 955.874140] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 955.890425] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 955.921320] bond0 (unregistering): Released all slaves [ 955.942508] team0 (unregistering): Port device team_slave_1 removed [ 955.954383] team0 (unregistering): Port device team_slave_0 removed [ 955.965604] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 955.980848] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 956.012238] bond0 (unregistering): Released all slaves [ 956.031943] team0 (unregistering): Port device team_slave_1 removed [ 956.048514] team0 (unregistering): Port device team_slave_0 removed [ 956.060454] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 956.076151] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 956.125846] bond0 (unregistering): Released all slaves [ 956.141761] team0 (unregistering): Port device team_slave_1 removed [ 956.151110] team0 (unregistering): Port device team_slave_0 removed [ 956.160791] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 956.178715] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 956.202911] bond0 (unregistering): Released all slaves [ 956.220616] team0 (unregistering): Port device team_slave_1 removed [ 956.230071] team0 (unregistering): Port device team_slave_0 removed [ 956.239542] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 956.254860] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 956.277535] bond0 (unregistering): Released all slaves [ 956.294958] team0 (unregistering): Port device team_slave_1 removed [ 956.304683] team0 (unregistering): Port device team_slave_0 removed [ 956.314053] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 956.329828] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 956.352616] bond0 (unregistering): Released all slaves [ 956.370068] team0 (unregistering): Port device team_slave_1 removed [ 956.379841] team0 (unregistering): Port device team_slave_0 removed [ 956.389345] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 956.404855] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 956.436579] bond0 (unregistering): Released all slaves [ 956.532057] IPVS: ftp: loaded support on port[0] = 21 [ 956.796418] bridge0: port 1(bridge_slave_0) entered blocking state [ 956.803031] bridge0: port 1(bridge_slave_0) entered disabled state [ 956.839050] device bridge_slave_0 entered promiscuous mode [ 956.865293] bridge0: port 1(bridge_slave_0) entered blocking state [ 956.871794] bridge0: port 1(bridge_slave_0) entered disabled state [ 956.894154] device bridge_slave_0 entered promiscuous mode [ 956.955304] bridge0: port 2(bridge_slave_1) entered blocking state [ 956.961809] bridge0: port 2(bridge_slave_1) entered disabled state [ 956.992119] device bridge_slave_1 entered promiscuous mode [ 957.033217] bridge0: port 2(bridge_slave_1) entered blocking state [ 957.039693] bridge0: port 2(bridge_slave_1) entered disabled state [ 957.063377] device bridge_slave_1 entered promiscuous mode [ 957.134572] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 957.277559] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 957.366571] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 957.509091] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 957.939571] IPVS: ftp: loaded support on port[0] = 21 [ 957.946854] IPVS: ftp: loaded support on port[0] = 21 [ 957.955366] IPVS: ftp: loaded support on port[0] = 21 [ 957.983466] IPVS: ftp: loaded support on port[0] = 21 [ 958.076760] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 958.098763] bridge0: port 1(bridge_slave_0) entered blocking state [ 958.105254] bridge0: port 1(bridge_slave_0) entered disabled state [ 958.131096] device bridge_slave_0 entered promiscuous mode [ 958.283642] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 958.329594] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 958.429904] bridge0: port 2(bridge_slave_1) entered blocking state [ 958.436444] bridge0: port 2(bridge_slave_1) entered disabled state [ 958.502108] device bridge_slave_1 entered promiscuous mode [ 958.533608] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 958.774170] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 958.797391] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 958.804534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 958.822293] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 958.832219] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 959.063401] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 959.072273] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 959.091396] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 959.635739] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 959.655883] team0: Port device team_slave_0 added [ 959.890148] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 959.923510] team0: Port device team_slave_0 added [ 959.955232] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 959.979860] team0: Port device team_slave_1 added [ 960.150728] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 960.189860] team0: Port device team_slave_1 added [ 960.230387] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 960.240116] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 960.255859] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 960.310728] bridge0: port 1(bridge_slave_0) entered blocking state [ 960.317234] bridge0: port 1(bridge_slave_0) entered disabled state [ 960.374088] device bridge_slave_0 entered promiscuous mode [ 960.436160] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 960.448036] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 960.472234] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 960.520348] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 960.527362] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 960.548796] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 960.657406] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 960.665074] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 960.677639] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 960.731587] bridge0: port 2(bridge_slave_1) entered blocking state [ 960.738176] bridge0: port 2(bridge_slave_1) entered disabled state [ 960.787638] device bridge_slave_1 entered promiscuous mode [ 960.832118] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 960.839851] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 960.855188] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 960.890314] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 960.898761] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 960.928668] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 960.986456] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 961.001203] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 961.038042] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 961.086887] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 961.098813] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 961.106417] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 961.122141] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 961.175556] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 961.183116] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 961.197054] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 961.363767] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 961.426245] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 961.433745] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 961.445075] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 962.144230] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 962.436044] bridge0: port 1(bridge_slave_0) entered blocking state [ 962.442591] bridge0: port 1(bridge_slave_0) entered disabled state [ 962.469070] device bridge_slave_0 entered promiscuous mode [ 962.484900] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 962.507634] bridge0: port 1(bridge_slave_0) entered blocking state [ 962.514144] bridge0: port 1(bridge_slave_0) entered disabled state [ 962.558033] device bridge_slave_0 entered promiscuous mode [ 962.627086] bridge0: port 1(bridge_slave_0) entered blocking state [ 962.633565] bridge0: port 1(bridge_slave_0) entered disabled state [ 962.689081] device bridge_slave_0 entered promiscuous mode [ 962.718644] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 962.726385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 962.744041] bridge0: port 2(bridge_slave_1) entered blocking state [ 962.750556] bridge0: port 2(bridge_slave_1) entered disabled state [ 962.783342] device bridge_slave_1 entered promiscuous mode [ 962.810122] bridge0: port 2(bridge_slave_1) entered blocking state [ 962.816768] bridge0: port 2(bridge_slave_1) entered disabled state [ 962.859929] device bridge_slave_1 entered promiscuous mode [ 962.921260] bridge0: port 2(bridge_slave_1) entered blocking state [ 962.927775] bridge0: port 2(bridge_slave_1) entered disabled state [ 962.988168] device bridge_slave_1 entered promiscuous mode [ 963.008280] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 963.026561] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 963.048918] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 963.106466] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 963.200558] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 963.274654] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 963.302572] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 963.395390] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 963.679208] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 963.709729] team0: Port device team_slave_0 added [ 963.822752] bridge0: port 2(bridge_slave_1) entered blocking state [ 963.829237] bridge0: port 2(bridge_slave_1) entered forwarding state [ 963.836072] bridge0: port 1(bridge_slave_0) entered blocking state [ 963.842510] bridge0: port 1(bridge_slave_0) entered forwarding state [ 963.903427] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 963.919077] bridge0: port 2(bridge_slave_1) entered blocking state [ 963.925533] bridge0: port 2(bridge_slave_1) entered forwarding state [ 963.932300] bridge0: port 1(bridge_slave_0) entered blocking state [ 963.938710] bridge0: port 1(bridge_slave_0) entered forwarding state [ 963.977768] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 963.988941] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 964.000135] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 964.018358] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 964.054693] team0: Port device team_slave_1 added [ 964.075292] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 964.228729] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 964.244632] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 964.281708] bridge0: port 2(bridge_slave_1) entered blocking state [ 964.288200] bridge0: port 2(bridge_slave_1) entered forwarding state [ 964.295031] bridge0: port 1(bridge_slave_0) entered blocking state [ 964.301465] bridge0: port 1(bridge_slave_0) entered forwarding state [ 964.372073] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 964.394474] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 964.401903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 964.414830] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 964.457357] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 964.464857] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 964.472760] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 964.517349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 964.544742] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 964.665677] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 964.673144] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 964.687101] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 964.723839] syz-executor4: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 964.735308] syz-executor4 cpuset=/ mems_allowed=0 [ 964.737254] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 964.740313] CPU: 0 PID: 27103 Comm: syz-executor4 Not tainted 4.17.0+ #9 [ 964.753748] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 964.763128] Call Trace: [ 964.765772] dump_stack+0x185/0x1d0 [ 964.769441] warn_alloc+0x430/0x690 [ 964.773135] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 964.775723] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 964.778037] ? __msan_poison_alloca+0x15c/0x1d0 [ 964.778112] copy_process+0x778/0x9be0 [ 964.793318] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 964.798809] ? ptep_set_access_flags+0x10e/0x1d0 [ 964.803599] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 964.809074] ? __msan_poison_alloca+0x141/0x1d0 [ 964.813771] _do_fork+0x353/0xf60 [ 964.817257] __x64_sys_clone+0x15e/0x1b0 [ 964.821340] ? __ia32_sys_vfork+0x70/0x70 [ 964.825494] do_syscall_64+0x15b/0x230 [ 964.829394] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 964.834584] RIP: 0033:0x41f8b9 [ 964.837779] RSP: 002b:0000000000a3fad0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 964.845501] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000041f8b9 [ 964.852783] RDX: 0000000000a3fadc RSI: 0000000000000000 RDI: 0000000000100011 [ 964.860052] RBP: 0000000000a3fc80 R08: 0000000000a44a60 R09: 000000000000002c [ 964.867321] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000a3fe68 [ 964.874591] R13: 0000000000a3fe28 R14: 0000000000000000 R15: 0000000000000000 [ 964.882235] Mem-Info: [ 964.884785] active_anon:144663 inactive_anon:78 isolated_anon:0 [ 964.884785] active_file:1989 inactive_file:4427 isolated_file:128 [ 964.884785] unevictable:0 dirty:1 writeback:17 unstable:0 [ 964.884785] slab_reclaimable:3318 slab_unreclaimable:8731 [ 964.884785] mapped:71378 shmem:84 pagetables:1141 bounce:0 [ 964.884785] free:25365 free_pcp:421 free_cma:0 [ 964.888710] sh: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 964.918231] Node 0 active_anon:578652kB inactive_anon:312kB active_file:7956kB inactive_file:17708kB unevictable:0kB isolated(anon):0kB isolated(file):384kB mapped:285396kB dirty:4kB writeback:68kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 256000kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 964.928554] sh cpuset= [ 964.956681] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 964.956751] lowmem_reserve[]: 0 2817 7244 7244 [ 964.956788] Node 0 DMA32 free:49468kB min:26224kB low:32780kB high:39336kB active_anon:228420kB inactive_anon:36kB active_file:5672kB inactive_file:17960kB unevictable:0kB writepending:68kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2112kB pagetables:1756kB bounce:0kB free_pcp:1348kB local_pcp:708kB free_cma:0kB [ 964.956853] lowmem_reserve[]: 0 0 4426 4426 [ 964.956887] Node 0 Normal free:34848kB min:41208kB low:51508kB high:61808kB active_anon:350332kB inactive_anon:276kB active_file:2160kB inactive_file:112kB unevictable:0kB writepending:4kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7552kB pagetables:2808kB bounce:0kB free_pcp:172kB local_pcp:148kB free_cma:0kB [ 964.956987] lowmem_reserve[]: 0 0 0 0 [ 964.957021] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB [ 964.959585] / mems_allowed=0 [ 964.985744] (U) [ 964.990350] CPU: 1 PID: 27470 Comm: sh Not tainted 4.17.0+ #9 [ 964.990379] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 965.019737] 2*64kB [ 965.024006] Call Trace: [ 965.024046] dump_stack+0x185/0x1d0 [ 965.024091] warn_alloc+0x430/0x690 [ 965.053247] (U) [ 965.057043] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 965.057102] ? __msan_poison_alloca+0x15c/0x1d0 [ 965.062006] 1*128kB [ 965.065081] copy_process+0x778/0x9be0 [ 965.067026] (U) [ 965.072905] ? kmsan_set_origin_inline+0x6b/0x120 [ 965.072941] ? __msan_poison_alloca+0x15c/0x1d0 [ 965.082302] 1*256kB [ 965.084515] ? cp_new_stat+0x327/0x9b0 [ 965.084565] ? __msan_poison_alloca+0x141/0x1d0 [ 965.087134] (U) [ 965.090762] _do_fork+0x353/0xf60 [ 965.090808] __x64_sys_clone+0x15e/0x1b0 [ 965.094426] 0*512kB [ 965.096384] ? __ia32_sys_vfork+0x70/0x70 [ 965.096418] do_syscall_64+0x15b/0x230 [ 965.101255] 1*1024kB [ 965.105928] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 965.105959] RIP: 0033:0x7fee09405f46 [ 965.108281] (U) [ 965.112134] RSP: 002b:00007fffd67a4230 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 965.112164] RAX: ffffffffffffffda RBX: 00007fffd67a4230 RCX: 00007fee09405f46 [ 965.112187] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 965.114164] 1*2048kB [ 965.118971] RBP: 00007fffd67a4270 R08: 0000000000000000 R09: 0000000000000034 [ 965.118992] R10: 00007fee098fc9d0 R11: 0000000000000246 R12: 0000000000000000 [ 965.119018] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 965.123686] (M) [ 965.130595] syz-executor6: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 965.134638] 3*4096kB [ 965.136671] syz-executor6 cpuset= [ 965.140119] (M) [ 965.144195] / [ 965.146535] = 15904kB [ 965.150685] mems_allowed=0 [ 965.154575] Node 0 DMA32: 529*4kB [ 965.157054] CPU: 1 PID: 26945 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 965.162239] (UM) [ 965.165918] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 965.165930] Call Trace: [ 965.165975] dump_stack+0x185/0x1d0 [ 965.166016] warn_alloc+0x430/0x690 [ 965.167985] 2397*8kB [ 965.175712] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 965.175771] ? __msan_poison_alloca+0x15c/0x1d0 [ 965.183025] (UM) [ 965.190329] copy_process+0x778/0x9be0 [ 965.190365] ? prepare_exit_to_usermode+0x271/0x3a0 [ 965.192775] 619*16kB [ 965.200037] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 965.200074] ? do_signal+0x49f/0x1d20 [ 965.207362] (M) 58*32kB (UME) 2*64kB (UE) 3*128kB (UME) 3*256kB (UME) 1*512kB (E) 1*1024kB (E) 5*2048kB (UH) 1*4096kB (H) = 50204kB [ 965.207466] Node 0 Normal: 4747*4kB (ME) 796*8kB (UME) 258*16kB (UME) 96*32kB (UM) 20*64kB (UM) 10*128kB (UM) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 35116kB [ 965.207602] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 965.207609] 6490 total pagecache pages [ 965.207618] 0 pages in swap cache [ 965.207630] Swap cache stats: add 0, delete 0, find 0/0 [ 965.207636] Free swap = 0kB [ 965.207642] Total swap = 0kB [ 965.207650] 1965969 pages RAM [ 965.207655] 0 pages HighMem/MovableOnly [ 965.207662] 106316 pages reserved [ 965.213072] syz-executor0: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 965.215329] ? __msan_poison_alloca+0x141/0x1d0 [ 965.215386] _do_fork+0x353/0xf60 [ 965.217361] syz-executor0 cpuset= [ 965.228637] __x64_sys_clone+0x15e/0x1b0 [ 965.228683] ? __ia32_sys_vfork+0x70/0x70 [ 965.231098] / [ 965.234530] do_syscall_64+0x15b/0x230 [ 965.236511] mems_allowed=0 [ 965.238206] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 965.238234] RIP: 0033:0x41f8b9 [ 965.421465] RSP: 002b:0000000000a3fad0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 965.429189] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000041f8b9 [ 965.436477] RDX: 0000000000a3fadc RSI: 0000000000000000 RDI: 0000000000100011 [ 965.443772] RBP: 0000000000a3fc80 R08: 0000000000a44a60 R09: 0000000000000025 [ 965.451048] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000a3fe80 [ 965.458324] R13: 0000000000a3fe28 R14: 0000000000000000 R15: 0000000000000000 [ 965.465629] CPU: 0 PID: 26972 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 965.472497] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 965.481859] Call Trace: [ 965.484467] dump_stack+0x185/0x1d0 [ 965.488105] warn_alloc+0x430/0x690 [ 965.491756] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 965.496630] ? __msan_poison_alloca+0x15c/0x1d0 [ 965.501345] copy_process+0x778/0x9be0 [ 965.505259] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 965.510720] ? ptep_set_access_flags+0x10e/0x1d0 [ 965.515509] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 965.520988] ? __msan_poison_alloca+0x141/0x1d0 [ 965.525686] _do_fork+0x353/0xf60 [ 965.529174] __x64_sys_clone+0x15e/0x1b0 [ 965.533246] ? __ia32_sys_vfork+0x70/0x70 [ 965.537411] do_syscall_64+0x15b/0x230 [ 965.541313] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 965.546506] RIP: 0033:0x41f8b9 [ 965.549693] RSP: 002b:0000000000a3fad0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 965.557409] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000041f8b9 [ 965.564853] RDX: 0000000000a3fadc RSI: 0000000000000000 RDI: 0000000000100011 [ 965.572120] RBP: 0000000000a3fc80 R08: 0000000000a44a60 R09: 0000000000000024 [ 965.579390] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000a3fe90 [ 965.586660] R13: 0000000000a3fe28 R14: 0000000000000000 R15: 0000000000000000 [ 965.597901] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 966.207091] device bridge_slave_1 left promiscuous mode [ 966.213117] bridge0: port 2(bridge_slave_1) entered disabled state [ 966.253847] device bridge_slave_0 left promiscuous mode [ 966.259604] bridge0: port 1(bridge_slave_0) entered disabled state [ 966.295241] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 966.315094] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 966.344539] bond0 (unregistering): Released all slaves [ 966.604074] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 966.635779] team0: Port device team_slave_0 added [ 966.805139] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 966.824853] team0: Port device team_slave_1 added [ 966.989288] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 966.996299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 967.008809] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 967.152402] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 967.159536] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 967.168330] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 967.320459] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 967.327947] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 967.343903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 967.520620] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 967.528350] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 967.542060] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 967.568319] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 969.003418] bridge0: port 2(bridge_slave_1) entered blocking state [ 969.009885] bridge0: port 2(bridge_slave_1) entered forwarding state [ 969.016697] bridge0: port 1(bridge_slave_0) entered blocking state [ 969.023124] bridge0: port 1(bridge_slave_0) entered forwarding state [ 969.038313] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 969.046112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 969.071428] IPVS: ftp: loaded support on port[0] = 21 [ 970.584914] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 970.591661] 8021q: adding VLAN 0 to HW filter on device bond0 [ 971.135187] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 971.236155] bridge0: port 1(bridge_slave_0) entered blocking state [ 971.242752] bridge0: port 1(bridge_slave_0) entered disabled state [ 971.264250] device bridge_slave_0 entered promiscuous mode [ 971.431420] bridge0: port 2(bridge_slave_1) entered blocking state [ 971.438061] bridge0: port 2(bridge_slave_1) entered disabled state [ 971.462189] device bridge_slave_1 entered promiscuous mode [ 971.520655] 8021q: adding VLAN 0 to HW filter on device bond0 [ 971.591755] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 971.603776] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 971.610924] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 971.621236] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 971.729854] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 972.023739] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 972.124504] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 972.131160] 8021q: adding VLAN 0 to HW filter on device team0 [ 972.147081] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 972.281743] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 972.470443] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 972.476787] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 972.488216] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 972.628749] 8021q: adding VLAN 0 to HW filter on device bond0 [ 972.942706] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 972.959897] team0: Port device team_slave_0 added [ 972.983038] 8021q: adding VLAN 0 to HW filter on device team0 [ 973.087578] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 973.101660] team0: Port device team_slave_1 added [ 973.152693] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 973.230637] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 973.358214] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 973.486299] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 973.496266] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 973.508444] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 973.619892] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 973.627407] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 973.635950] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 973.675190] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 973.682726] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 973.698766] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 973.712451] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 974.164722] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 974.171027] 8021q: adding VLAN 0 to HW filter on device team0 [ 974.197831] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 974.459259] 8021q: adding VLAN 0 to HW filter on device bond0 [ 975.038027] bridge0: port 2(bridge_slave_1) entered blocking state [ 975.044513] bridge0: port 2(bridge_slave_1) entered forwarding state [ 975.051347] bridge0: port 1(bridge_slave_0) entered blocking state [ 975.057786] bridge0: port 1(bridge_slave_0) entered forwarding state [ 975.072202] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 975.078710] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 975.157436] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 975.693866] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 975.700298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 975.708854] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 975.895752] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 975.902759] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 976.219033] 8021q: adding VLAN 0 to HW filter on device team0 [ 976.836261] device bridge_slave_1 left promiscuous mode [ 976.842114] bridge0: port 2(bridge_slave_1) entered disabled state 19:45:15 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) unlinkat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) 19:45:15 executing program 1: syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') 19:45:15 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) syz_open_dev$urandom(&(0x7f0000001140)='/dev/urandom\x00', 0x0, 0x0) syz_open_dev$urandom(&(0x7f00000012c0)='/dev/urandom\x00', 0x0, 0x0) 19:45:15 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000100), 0x0) 19:45:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) 19:45:15 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023d}]}) eventfd(0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000000)=@random={'trusted.', 'eth1\x00'}, &(0x7f0000000040)=""/199, 0xc7) 19:45:15 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f7}]}) socket$inet(0x2, 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(0xffffffffffffffff, 0x227f, &(0x7f0000000580)) [ 976.895933] device bridge_slave_0 left promiscuous mode [ 976.901828] bridge0: port 1(bridge_slave_0) entered disabled state [ 977.094891] team0 (unregistering): Port device team_slave_1 removed [ 977.130402] team0 (unregistering): Port device team_slave_0 removed [ 977.153686] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 977.225605] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 977.300483] bond0 (unregistering): Released all slaves [ 977.453302] ip invoked oom-killer: gfp_mask=0x14280ca(GFP_HIGHUSER_MOVABLE|__GFP_ZERO), nodemask=(null), order=0, oom_score_adj=0 [ 977.465216] ip cpuset=/ mems_allowed=0 [ 977.469239] CPU: 0 PID: 28225 Comm: ip Not tainted 4.17.0+ #9 [ 977.475139] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 977.484504] Call Trace: [ 977.487114] dump_stack+0x185/0x1d0 [ 977.490754] dump_header+0x2cc/0x16f0 [ 977.494574] ? __msan_poison_alloca+0x15c/0x1d0 [ 977.499266] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 977.504733] ? ___ratelimit+0x67f/0x760 [ 977.508730] oom_kill_process+0x341/0x2160 [ 977.512993] ? oom_evaluate_task+0x856/0xb60 [ 977.517437] out_of_memory+0x1700/0x1da0 [ 977.521519] __alloc_pages_nodemask+0x4e4f/0x5cc0 [ 977.526423] alloc_pages_vma+0xcc6/0x17f0 [ 977.530615] handle_mm_fault+0x41ec/0x7ed0 [ 977.534868] ? kmsan_set_origin_inline+0x6b/0x120 [ 977.539752] __do_page_fault+0xec6/0x1a10 [ 977.543919] do_page_fault+0xb7/0x250 [ 977.547732] ? page_fault+0x8/0x30 [ 977.551277] page_fault+0x1e/0x30 [ 977.554728] RIP: 0033:0x7f7b73a4aea4 [ 977.558433] RSP: 002b:00007fff67ee8980 EFLAGS: 00010206 [ 977.563801] RAX: 0000000000000000 RBX: 00007f7b6c000078 RCX: 00007f7b6c001020 [ 977.571082] RDX: 0000000000000004 RSI: 0000000000000038 RDI: 00007f7b6c000020 [ 977.578353] RBP: 00007f7b6c000020 R08: 00007f7b6c0000a8 R09: 0000000001680000 [ 977.585625] R10: 0000000000000000 R11: 00007f7b73a54a2a R12: 00007f7b6c000ff0 [ 977.592893] R13: 000000000001ffe1 R14: 0000000000000000 R15: 0000000000000004 [ 977.600426] Mem-Info: [ 977.602970] active_anon:144883 inactive_anon:78 isolated_anon:0 [ 977.602970] active_file:346 inactive_file:345 isolated_file:32 [ 977.602970] unevictable:0 dirty:5 writeback:0 unstable:0 [ 977.602970] slab_reclaimable:3315 slab_unreclaimable:8820 [ 977.602970] mapped:63634 shmem:84 pagetables:1058 bounce:0 [ 977.602970] free:18991 free_pcp:89 free_cma:0 [ 977.636306] Node 0 active_anon:579532kB inactive_anon:312kB active_file:1256kB inactive_file:1380kB unevictable:0kB isolated(anon):0kB isolated(file):128kB mapped:254420kB dirty:20kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 256000kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 977.664413] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 977.690663] lowmem_reserve[]: 0 2817 7244 7244 [ 977.695343] Node 0 DMA32 free:43388kB min:26224kB low:32780kB high:39336kB active_anon:229036kB inactive_anon:36kB active_file:1272kB inactive_file:816kB unevictable:0kB writepending:20kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2304kB pagetables:1448kB bounce:0kB free_pcp:236kB local_pcp:0kB free_cma:0kB [ 977.724375] lowmem_reserve[]: 0 0 4426 4426 [ 977.728790] Node 0 Normal free:15948kB min:41208kB low:51508kB high:61808kB active_anon:350264kB inactive_anon:276kB active_file:1188kB inactive_file:828kB unevictable:0kB writepending:0kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7232kB pagetables:2784kB bounce:0kB free_pcp:4kB local_pcp:0kB free_cma:0kB [ 977.757709] lowmem_reserve[]: 0 0 0 0 [ 977.761599] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 977.775050] Node 0 DMA32: 791*4kB (UM) 3755*8kB (M) 454*16kB (M) 16*32kB (UM) 1*64kB (U) 0*128kB 1*256kB (U) 1*512kB (U) 0*1024kB 1*2048kB (U) 0*4096kB = 43860kB [ 977.789873] Node 0 Normal: 3137*4kB (UME) 277*8kB (UMH) 61*16kB (UMH) 1*32kB (H) 3*64kB (H) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 15964kB [ 977.804084] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 977.812729] 425 total pagecache pages [ 977.816586] 0 pages in swap cache [ 977.820096] Swap cache stats: add 0, delete 0, find 0/0 [ 977.825511] Free swap = 0kB [ 977.828575] Total swap = 0kB [ 977.831645] 1965969 pages RAM [ 977.834794] 0 pages HighMem/MovableOnly [ 977.838811] 106316 pages reserved [ 977.842305] [ pid ] uid tgid total_vm rss pgtables_bytes swapents oom_score_adj name [ 977.851033] [ 2268] 0 2268 5475 332 90112 0 -1000 udevd [ 977.859267] [ 4225] 0 4225 2493 573 61440 0 0 dhclient [ 977.867758] [ 4359] 0 4359 30604 99 126976 0 0 rsyslogd [ 977.876241] [ 4402] 0 4402 4725 69 77824 0 0 cron [ 977.884371] [ 4428] 0 4428 12490 188 139264 0 -1000 sshd [ 977.892679] [ 4452] 0 4452 3694 86 73728 0 0 getty [ 977.901104] [ 4453] 0 4453 3694 86 73728 0 0 getty [ 977.909339] [ 4454] 0 4454 3694 82 77824 0 0 getty [ 977.917568] [ 4455] 0 4455 3694 80 73728 0 0 getty [ 977.925796] [ 4456] 0 4456 3694 63 73728 0 0 getty [ 977.934025] [ 4457] 0 4457 3694 64 73728 0 0 getty [ 977.942251] [ 4458] 0 4458 3649 61 73728 0 0 getty [ 977.950494] [ 4474] 0 4474 17821 198 184320 0 0 sshd [ 977.958642] [ 4476] 0 4476 284019 142621 1949696 0 0 syz-fuzzer [ 977.967319] [14512] 0 14512 5474 288 86016 0 -1000 udevd [ 977.975564] [26919] 0 26919 17553 14 118784 0 0 syz-executor1 [ 977.984472] [26922] 0 26922 17553 15 118784 0 0 syz-executor6 [ 977.993399] [26942] 0 26942 17552 8238 126976 0 0 syz-executor1 [ 978.002327] [26945] 0 26945 17552 8240 126976 0 0 syz-executor6 [ 978.011256] [26958] 0 26958 17553 14 118784 0 0 syz-executor0 [ 978.020184] [26972] 0 26972 17552 8220 126976 0 0 syz-executor0 [ 978.029115] [27035] 0 27035 17553 15 118784 0 0 syz-executor5 [ 978.038126] [27036] 0 27036 17552 8219 131072 0 0 syz-executor5 [ 978.047053] [27071] 0 27071 17553 15 122880 0 0 syz-executor4 [ 978.056007] [27103] 0 27103 17552 8164 131072 0 0 syz-executor4 [ 978.064932] [27474] 0 27474 5474 270 86016 0 -1000 udevd [ 978.073217] [27632] 0 27632 17553 14 118784 0 0 syz-executor7 [ 978.082138] [27657] 0 27657 17553 8211 118784 0 0 syz-executor7 [ 978.091057] [28223] 0 28223 1050 17 57344 0 0 sh [ 978.099026] [28225] 0 28225 18486 27 65536 0 0 ip [ 978.107004] [28226] 0 28226 16529 15 106496 0 0 syz-executor3 [ 978.115923] [28235] 0 28235 16529 16 110592 0 0 syz-executor2 [ 978.124849] [28242] 0 28242 5474 270 86016 0 -1000 udevd [ 978.133099] [28243] 0 28243 5474 270 86016 0 -1000 udevd [ 978.141310] Out of memory: Kill process 4476 (syz-fuzzer) score 76 or sacrifice child [ 978.149421] Killed process 27071 (syz-executor4) total-vm:70212kB, anon-rss:60kB, file-rss:0kB, shmem-rss:0kB [ 978.934521] syz-executor2 invoked oom-killer: gfp_mask=0x14082c2(GFP_KERNEL|__GFP_HIGHMEM|__GFP_NOWARN|__GFP_ZERO), nodemask=(null), order=0, oom_score_adj=0 [ 978.949103] syz-executor2 cpuset=/ mems_allowed=0 [ 978.954083] CPU: 1 PID: 28235 Comm: syz-executor2 Not tainted 4.17.0+ #9 [ 978.960948] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 978.970340] Call Trace: [ 978.972987] dump_stack+0x185/0x1d0 [ 978.976650] dump_header+0x2cc/0x16f0 [ 978.980484] ? __msan_poison_alloca+0x15c/0x1d0 [ 978.985218] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 978.990714] ? ___ratelimit+0x67f/0x760 [ 978.994744] oom_kill_process+0x341/0x2160 [ 978.999037] ? oom_evaluate_task+0x856/0xb60 [ 979.003514] out_of_memory+0x1700/0x1da0 [ 979.007626] ? __udp4_lib_lookup+0x1540/0x28e0 [ 979.012252] __alloc_pages_nodemask+0x4e4f/0x5cc0 [ 979.017209] alloc_pages_current+0x6b1/0x970 [ 979.021662] __vmalloc_node_range+0x83c/0x1170 [ 979.026315] vmalloc_user+0xe1/0x3d0 [ 979.030078] ? kcov_mmap+0x2a/0x120 [ 979.033763] ? kcov_ioctl+0x1d0/0x1d0 [ 979.037610] kcov_mmap+0x2a/0x120 [ 979.041095] ? kcov_ioctl+0x1d0/0x1d0 [ 979.044930] mmap_region+0x2751/0x3730 [ 979.048879] do_mmap+0x1902/0x2010 [ 979.052477] vm_mmap_pgoff+0x31b/0x430 [ 979.056446] ksys_mmap_pgoff+0xa5a/0xaf0 [ 979.060580] __x64_sys_mmap+0x1f1/0x260 [ 979.064597] ? align_vdso_addr+0x420/0x420 [ 979.068857] do_syscall_64+0x15b/0x230 [ 979.072789] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 979.078008] RIP: 0033:0x455aea [ 979.081217] RSP: 002b:00007ffd30498488 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 979.088962] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000455aea [ 979.096263] RDX: 0000000000000003 RSI: 0000000000200000 RDI: 0000000000000000 [ 979.103564] RBP: 0000000000000011 R08: 0000000000000011 R09: 0000000000000000 [ 979.110867] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000000 [ 979.118173] R13: 0000000000200000 R14: 0000000000000001 R15: 0000000000000000 [ 979.125821] Mem-Info: [ 979.128380] active_anon:144810 inactive_anon:78 isolated_anon:14 [ 979.128380] active_file:84 inactive_file:1282 isolated_file:0 [ 979.128380] unevictable:0 dirty:0 writeback:0 unstable:0 [ 979.128380] slab_reclaimable:3301 slab_unreclaimable:8782 [ 979.128380] mapped:57286 shmem:84 pagetables:1077 bounce:0 [ 979.128380] free:39678 free_pcp:121 free_cma:0 [ 979.161459] Node 0 active_anon:579240kB inactive_anon:312kB active_file:336kB inactive_file:5824kB unevictable:0kB isolated(anon):56kB isolated(file):0kB mapped:229840kB dirty:0kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 256000kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 979.189335] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 979.212224] IPVS: ftp: loaded support on port[0] = 21 [ 979.216419] lowmem_reserve[]: 0 2817 7244 7244 [ 979.216459] Node 0 DMA32 free:126716kB min:26224kB low:32780kB high:39336kB active_anon:228948kB inactive_anon:36kB active_file:372kB inactive_file:5752kB unevictable:0kB writepending:148kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2176kB pagetables:1664kB bounce:0kB free_pcp:120kB local_pcp:0kB free_cma:0kB [ 979.216541] lowmem_reserve[]: 0 0 4426 4426 [ 979.259986] Node 0 Normal free:15256kB min:41208kB low:51508kB high:61808kB active_anon:350264kB inactive_anon:276kB active_file:24kB inactive_file:0kB unevictable:0kB writepending:0kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7232kB pagetables:2792kB bounce:0kB free_pcp:8kB local_pcp:0kB free_cma:0kB [ 979.288630] lowmem_reserve[]: 0 0 0 0 [ 979.292566] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 979.306067] Node 0 DMA32: 292*4kB (UM) 3020*8kB (UM) 531*16kB (UM) 304*32kB (UM) 541*64kB (UM) 180*128kB (UM) 61*256kB (UM) 11*512kB (UM) 2*1024kB (UM) 1*2048kB (M) 0*4096kB = 126560kB [ 979.322925] Node 0 Normal: 3155*4kB (UME) 177*8kB (UMEH) 53*16kB (UMH) 7*32kB (UH) 3*64kB (H) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 15300kB [ 979.337259] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 979.345984] 1673 total pagecache pages [ 979.349947] 0 pages in swap cache [ 979.353523] Swap cache stats: add 0, delete 0, find 0/0 [ 979.358996] Free swap = 0kB [ 979.362068] Total swap = 0kB [ 979.365159] 1965969 pages RAM [ 979.368310] 0 pages HighMem/MovableOnly [ 979.372375] 106316 pages reserved [ 979.375890] [ pid ] uid tgid total_vm rss pgtables_bytes swapents oom_score_adj name [ 979.384639] [ 2268] 0 2268 5475 269 90112 0 -1000 udevd [ 979.392878] [ 4225] 0 4225 2493 573 61440 0 0 dhclient [ 979.401402] [ 4359] 0 4359 30604 150 126976 0 0 rsyslogd [ 979.409931] [ 4402] 0 4402 4725 47 77824 0 0 cron [ 979.418164] [ 4428] 0 4428 12490 153 139264 0 -1000 sshd [ 979.426359] [ 4452] 0 4452 3694 41 73728 0 0 getty [ 979.434616] [ 4453] 0 4453 3694 39 73728 0 0 getty [ 979.442861] [ 4454] 0 4454 3694 41 77824 0 0 getty [ 979.451094] [ 4455] 0 4455 3694 41 73728 0 0 getty [ 979.459308] [ 4456] 0 4456 3694 39 73728 0 0 getty [ 979.467524] [ 4457] 0 4457 3694 41 73728 0 0 getty [ 979.475745] [ 4458] 0 4458 3649 38 73728 0 0 getty [ 979.484036] [ 4474] 0 4474 17821 198 184320 0 0 sshd [ 979.492160] [ 4476] 0 4476 284019 142627 1949696 0 0 syz-fuzzer [ 979.500820] [14512] 0 14512 5474 270 86016 0 -1000 udevd [ 979.509047] [26919] 0 26919 17553 14 118784 0 0 syz-executor1 [ 979.518031] [26922] 0 26922 17553 15 118784 0 0 syz-executor6 [ 979.527044] [26942] 0 26942 17552 8218 126976 0 0 syz-executor1 [ 979.536020] [26945] 0 26945 17552 8219 126976 0 0 syz-executor6 [ 979.545020] [26958] 0 26958 17553 14 118784 0 0 syz-executor0 [ 979.554030] [26972] 0 26972 17552 8218 126976 0 0 syz-executor0 [ 979.563056] [27035] 0 27035 17553 15 118784 0 0 syz-executor5 [ 979.572065] [27036] 0 27036 17552 8219 131072 0 0 syz-executor5 [ 979.581075] [27474] 0 27474 5474 270 86016 0 -1000 udevd [ 979.589329] [27632] 0 27632 17553 14 118784 0 0 syz-executor7 [ 979.598296] [27657] 0 27657 17553 8242 118784 0 0 syz-executor7 [ 979.607226] [28226] 0 28226 17553 15 114688 0 0 syz-executor3 [ 979.616207] [28235] 0 28235 16529 16 110592 0 0 syz-executor2 [ 979.625183] [28242] 0 28242 5474 270 86016 0 -1000 udevd [ 979.633469] [28243] 0 28243 5474 270 86016 0 -1000 udevd [ 979.641740] [28247] 0 28247 17553 8211 114688 0 0 syz-executor3 [ 979.650726] [28248] 0 28248 1050 126 49152 0 0 sh [ 979.658779] [28250] 0 28250 636 48 45056 0 0 sysctl [ 979.667123] Out of memory: Kill process 4476 (syz-fuzzer) score 76 or sacrifice child [ 979.675226] Killed process 26922 (syz-executor6) total-vm:70212kB, anon-rss:60kB, file-rss:0kB, shmem-rss:0kB [ 979.827611] oom_reaper: reaped process 26922 (syz-executor6), now anon-rss:0kB, file-rss:0kB, shmem-rss:0kB 19:45:18 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_dev$urandom(&(0x7f0000001140)='/dev/urandom\x00', 0x0, 0x0) syz_open_dev$urandom(&(0x7f00000012c0)='/dev/urandom\x00', 0x0, 0x0) 19:45:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023d}]}) eventfd(0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000000)=@random={'trusted.', 'eth1\x00'}, &(0x7f0000000040)=""/199, 0xc7) 19:45:18 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) request_key(&(0x7f0000000100)='pkcs7_test\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a}, &(0x7f0000000380)='\x00', 0xfffffffffffffffd) inotify_init() 19:45:18 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f7}]}) socket$inet(0x2, 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(0xffffffffffffffff, 0x227f, &(0x7f0000000580)) 19:45:18 executing program 6: socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000180)) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000100), 0x0) 19:45:18 executing program 1: syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') [ 979.896182] IPVS: ftp: loaded support on port[0] = 21 19:45:18 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) request_key(&(0x7f0000000100)='pkcs7_test\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a}, &(0x7f0000000380)='\x00', 0xfffffffffffffffd) inotify_init() [ 980.015687] audit: type=1326 audit(1529696719.014:2111): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28273 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:45:19 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023d}]}) eventfd(0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000000)=@random={'trusted.', 'eth1\x00'}, &(0x7f0000000040)=""/199, 0xc7) [ 980.111554] device bridge_slave_1 left promiscuous mode [ 980.117314] bridge0: port 2(bridge_slave_1) entered disabled state [ 980.152007] device bridge_slave_0 left promiscuous mode [ 980.157755] bridge0: port 1(bridge_slave_0) entered disabled state 19:45:19 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) request_key(&(0x7f0000000100)='pkcs7_test\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a}, &(0x7f0000000380)='\x00', 0xfffffffffffffffd) inotify_init() [ 980.270792] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 980.298640] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 980.353603] bond0 (unregistering): Released all slaves [ 981.826294] device bridge_slave_1 left promiscuous mode [ 981.832136] bridge0: port 2(bridge_slave_1) entered disabled state [ 981.864726] device bridge_slave_0 left promiscuous mode [ 981.870451] bridge0: port 1(bridge_slave_0) entered disabled state [ 981.914788] team0 (unregistering): Port device team_slave_1 removed [ 981.926844] team0 (unregistering): Port device team_slave_0 removed [ 981.938367] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 981.954445] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 981.985716] bond0 (unregistering): Released all slaves [ 982.015342] bridge0: port 1(bridge_slave_0) entered blocking state [ 982.021768] bridge0: port 1(bridge_slave_0) entered disabled state [ 982.043870] device bridge_slave_0 entered promiscuous mode [ 982.095391] bridge0: port 1(bridge_slave_0) entered blocking state [ 982.101863] bridge0: port 1(bridge_slave_0) entered disabled state [ 982.122171] device bridge_slave_0 entered promiscuous mode [ 982.148734] bridge0: port 2(bridge_slave_1) entered blocking state [ 982.155198] bridge0: port 2(bridge_slave_1) entered disabled state [ 982.162646] device bridge_slave_1 entered promiscuous mode [ 982.244317] bridge0: port 2(bridge_slave_1) entered blocking state [ 982.250821] bridge0: port 2(bridge_slave_1) entered disabled state [ 982.259629] device bridge_slave_1 entered promiscuous mode [ 982.270350] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 982.332857] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 982.392080] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 982.449142] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 982.802183] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 982.816049] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 982.925509] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 982.956587] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 983.031867] IPVS: ftp: loaded support on port[0] = 21 19:45:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50249}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) rt_sigaction(0x0, &(0x7f0000000000), &(0x7f0000000080), 0x8, &(0x7f00000000c0)) [ 983.532504] device bridge_slave_1 left promiscuous mode [ 983.538422] bridge0: port 2(bridge_slave_1) entered disabled state [ 983.563070] device bridge_slave_0 left promiscuous mode [ 983.568782] bridge0: port 1(bridge_slave_0) entered disabled state [ 983.592699] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 983.610334] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 983.661584] bond0 (unregistering): Released all slaves 19:45:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) unlinkat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) 19:45:22 executing program 1: syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') 19:45:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6}]}) eventfd(0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000000)=@random={'trusted.', 'eth1\x00'}, &(0x7f0000000040)=""/199, 0xc7) 19:45:22 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) request_key(&(0x7f0000000100)='pkcs7_test\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a}, &(0x7f0000000380)='\x00', 0xfffffffffffffffd) inotify_init() 19:45:22 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_dev$urandom(&(0x7f0000001140)='/dev/urandom\x00', 0x0, 0x0) syz_open_dev$urandom(&(0x7f00000012c0)='/dev/urandom\x00', 0x0, 0x0) [ 983.860509] audit: type=1326 audit(1529696722.859:2112): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28403 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:45:23 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) request_key(&(0x7f0000000100)='pkcs7_test\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a}, &(0x7f0000000380)='\x00', 0xfffffffffffffffd) inotify_init() [ 983.943682] audit: type=1326 audit(1529696722.883:2113): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28406 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 983.976930] IPVS: ftp: loaded support on port[0] = 21 [ 985.818715] IPVS: ftp: loaded support on port[0] = 21 [ 986.917169] bridge0: port 1(bridge_slave_0) entered blocking state [ 986.923633] bridge0: port 1(bridge_slave_0) entered disabled state [ 986.965069] device bridge_slave_0 entered promiscuous mode [ 987.064552] bridge0: port 2(bridge_slave_1) entered blocking state [ 987.071062] bridge0: port 2(bridge_slave_1) entered disabled state [ 987.079220] device bridge_slave_1 entered promiscuous mode [ 988.471189] device bridge_slave_1 left promiscuous mode [ 988.476932] bridge0: port 2(bridge_slave_1) entered disabled state [ 988.496835] device bridge_slave_0 left promiscuous mode [ 988.502601] bridge0: port 1(bridge_slave_0) entered disabled state [ 988.546046] bond0 (unregistering): Released all slaves 19:45:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_dev$urandom(&(0x7f0000001140)='/dev/urandom\x00', 0x0, 0x0) syz_open_dev$urandom(&(0x7f00000012c0)='/dev/urandom\x00', 0x0, 0x0) 19:45:27 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) request_key(&(0x7f0000000100)='pkcs7_test\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a}, &(0x7f0000000380)='\x00', 0xfffffffffffffffd) inotify_init() 19:45:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f7}]}) socket$inet(0x2, 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(0xffffffffffffffff, 0x227f, &(0x7f0000000580)) 19:45:27 executing program 1: syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') times(&(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') [ 988.615473] audit: type=1326 audit(1529696727.614:2114): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28515 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 990.544941] IPVS: ftp: loaded support on port[0] = 21 [ 991.513343] syz-executor2 invoked oom-killer: gfp_mask=0x14082c2(GFP_KERNEL|__GFP_HIGHMEM|__GFP_NOWARN|__GFP_ZERO), nodemask=(null), order=0, oom_score_adj=0 [ 991.527741] syz-executor2 cpuset=/ mems_allowed=0 [ 991.532744] CPU: 1 PID: 28549 Comm: syz-executor2 Not tainted 4.17.0+ #9 [ 991.539603] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 991.548980] Call Trace: [ 991.551596] dump_stack+0x185/0x1d0 [ 991.555230] dump_header+0x2cc/0x16f0 [ 991.559049] ? __msan_poison_alloca+0x15c/0x1d0 [ 991.563734] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 991.569197] ? ___ratelimit+0x67f/0x760 [ 991.573192] oom_kill_process+0x341/0x2160 [ 991.577447] ? oom_evaluate_task+0x84a/0xb60 [ 991.581877] out_of_memory+0x1700/0x1da0 [ 991.585954] ? __udp4_lib_lookup+0x1540/0x28e0 [ 991.590564] __alloc_pages_nodemask+0x4e4f/0x5cc0 [ 991.595462] alloc_pages_current+0x6b1/0x970 [ 991.599880] __vmalloc_node_range+0x83c/0x1170 [ 991.604488] vmalloc_user+0xe1/0x3d0 [ 991.608216] ? kcov_mmap+0x2a/0x120 [ 991.611860] ? kcov_ioctl+0x1d0/0x1d0 [ 991.615671] kcov_mmap+0x2a/0x120 [ 991.619126] ? kcov_ioctl+0x1d0/0x1d0 [ 991.622931] mmap_region+0x2751/0x3730 [ 991.626865] do_mmap+0x1902/0x2010 [ 991.630453] vm_mmap_pgoff+0x31b/0x430 [ 991.634371] ksys_mmap_pgoff+0xa5a/0xaf0 [ 991.638465] __x64_sys_mmap+0x1f1/0x260 [ 991.642447] ? align_vdso_addr+0x420/0x420 [ 991.646684] do_syscall_64+0x15b/0x230 [ 991.650584] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 991.655774] RIP: 0033:0x455aea [ 991.658965] RSP: 002b:00007ffd02198828 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 991.666695] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000455aea [ 991.673974] RDX: 0000000000000003 RSI: 0000000000200000 RDI: 0000000000000000 [ 991.681246] RBP: 000000000000000d R08: 000000000000000d R09: 0000000000000000 [ 991.688517] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000000 [ 991.695797] R13: 0000000000200000 R14: 0000000000000001 R15: 0000000000000000 [ 991.703170] Mem-Info: [ 991.705709] active_anon:144659 inactive_anon:78 isolated_anon:0 [ 991.705709] active_file:38 inactive_file:0 isolated_file:0 [ 991.705709] unevictable:0 dirty:0 writeback:0 unstable:0 [ 991.705709] slab_reclaimable:3295 slab_unreclaimable:8535 [ 991.705709] mapped:61478 shmem:84 pagetables:1047 bounce:0 [ 991.705709] free:18653 free_pcp:36 free_cma:0 [ 991.738620] Node 0 active_anon:578636kB inactive_anon:312kB active_file:24kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:245912kB dirty:0kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 256000kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 991.766052] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 991.792317] lowmem_reserve[]: 0 2817 7244 7244 [ 991.797024] Node 0 DMA32 free:43548kB min:26224kB low:32780kB high:39336kB active_anon:228492kB inactive_anon:36kB active_file:340kB inactive_file:236kB unevictable:0kB writepending:0kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2048kB pagetables:1460kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 991.825741] lowmem_reserve[]: 0 0 4426 4426 [ 991.830173] Node 0 Normal free:15304kB min:41208kB low:51508kB high:61808kB active_anon:350144kB inactive_anon:276kB active_file:4kB inactive_file:16kB unevictable:0kB writepending:0kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7168kB pagetables:2728kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 991.858795] lowmem_reserve[]: 0 0 0 0 [ 991.862693] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 991.876175] Node 0 DMA32: 825*4kB (UM) 3787*8kB (M) 465*16kB (MH) 54*32kB (UM) 8*64kB (MH) 2*128kB (MH) 0*256kB 1*512kB (U) 0*1024kB 0*2048kB 0*4096kB = 44044kB [ 991.891003] Node 0 Normal: 3258*4kB (UME) 210*8kB (UM) 21*16kB (UMH) 4*32kB (H) 2*64kB (H) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 15304kB [ 991.905011] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 991.913660] 146 total pagecache pages [ 991.917527] 0 pages in swap cache [ 991.921049] Swap cache stats: add 0, delete 0, find 0/0 [ 991.926470] Free swap = 0kB [ 991.929547] Total swap = 0kB [ 991.932615] 1965969 pages RAM [ 991.935764] 0 pages HighMem/MovableOnly [ 991.939786] 106316 pages reserved [ 991.943289] [ pid ] uid tgid total_vm rss pgtables_bytes swapents oom_score_adj name [ 991.952029] [ 2268] 0 2268 5475 269 90112 0 -1000 udevd [ 991.960268] [ 4225] 0 4225 2493 573 61440 0 0 dhclient [ 991.968763] [ 4359] 0 4359 30604 150 126976 0 0 rsyslogd [ 991.977260] [ 4402] 0 4402 4725 47 77824 0 0 cron [ 991.985413] [ 4428] 0 4428 12490 153 139264 0 -1000 sshd [ 991.993568] [ 4452] 0 4452 3694 41 73728 0 0 getty [ 992.001805] [ 4453] 0 4453 3694 39 73728 0 0 getty [ 992.010040] [ 4454] 0 4454 3694 41 77824 0 0 getty [ 992.018274] [ 4455] 0 4455 3694 41 73728 0 0 getty [ 992.026526] [ 4456] 0 4456 3694 39 73728 0 0 getty [ 992.034810] [ 4457] 0 4457 3694 41 73728 0 0 getty [ 992.043053] [ 4458] 0 4458 3649 38 73728 0 0 getty [ 992.051284] [ 4474] 0 4474 17821 199 184320 0 0 sshd [ 992.059424] [ 4476] 0 4476 284019 142507 1949696 0 0 syz-fuzzer [ 992.068089] [26919] 0 26919 17553 14 118784 0 0 syz-executor1 [ 992.077033] [26942] 0 26942 17552 8218 126976 0 0 syz-executor1 [ 992.085958] [26958] 0 26958 17553 14 118784 0 0 syz-executor0 [ 992.094915] [26972] 0 26972 17552 8218 126976 0 0 syz-executor0 [ 992.103849] [27035] 0 27035 17553 15 118784 0 0 syz-executor5 [ 992.112794] [27036] 0 27036 17552 8219 131072 0 0 syz-executor5 [ 992.121717] [27632] 0 27632 17553 14 118784 0 0 syz-executor7 [ 992.130647] [27657] 0 27657 17552 8218 126976 0 0 syz-executor7 [ 992.139567] [28226] 0 28226 17553 14 114688 0 0 syz-executor3 [ 992.148486] [28242] 0 28242 5474 270 86016 0 -1000 udevd [ 992.156713] [28243] 0 28243 5474 270 86016 0 -1000 udevd [ 992.164944] [28247] 0 28247 17552 8218 122880 0 0 syz-executor3 [ 992.173900] [28527] 0 28527 17553 15 118784 0 0 syz-executor6 [ 992.182827] [28528] 0 28528 17553 8196 118784 0 0 syz-executor6 [ 992.191748] [28548] 0 28548 16529 17 106496 0 0 syz-executor4 [ 992.200671] [28549] 0 28549 14481 16 90112 0 0 syz-executor2 [ 992.209580] Out of memory: Kill process 4476 (syz-fuzzer) score 76 or sacrifice child [ 992.217693] Killed process 28527 (syz-executor6) total-vm:70212kB, anon-rss:60kB, file-rss:0kB, shmem-rss:0kB [ 992.257967] syz-executor4 invoked oom-killer: gfp_mask=0x14082c2(GFP_KERNEL|__GFP_HIGHMEM|__GFP_NOWARN|__GFP_ZERO), nodemask=(null), order=0, oom_score_adj=0 [ 992.272329] syz-executor4 cpuset=/ mems_allowed=0 [ 992.277283] CPU: 0 PID: 28548 Comm: syz-executor4 Not tainted 4.17.0+ #9 [ 992.284141] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 992.293519] Call Trace: [ 992.296155] dump_stack+0x185/0x1d0 [ 992.299888] dump_header+0x2cc/0x16f0 [ 992.303726] ? __msan_poison_alloca+0x15c/0x1d0 [ 992.308461] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 992.313976] ? ___ratelimit+0x67f/0x760 [ 992.317992] oom_kill_process+0x341/0x2160 [ 992.322272] ? oom_evaluate_task+0x84a/0xb60 [ 992.326744] out_of_memory+0x1700/0x1da0 [ 992.330854] ? __udp4_lib_lookup+0x1540/0x28e0 [ 992.335503] __alloc_pages_nodemask+0x4e4f/0x5cc0 [ 992.340438] alloc_pages_current+0x6b1/0x970 [ 992.344892] __vmalloc_node_range+0x83c/0x1170 [ 992.349547] vmalloc_user+0xe1/0x3d0 [ 992.353304] ? kcov_mmap+0x2a/0x120 [ 992.356981] ? kcov_ioctl+0x1d0/0x1d0 [ 992.360825] kcov_mmap+0x2a/0x120 [ 992.364304] ? kcov_ioctl+0x1d0/0x1d0 [ 992.368131] mmap_region+0x2751/0x3730 [ 992.372078] do_mmap+0x1902/0x2010 [ 992.376363] vm_mmap_pgoff+0x31b/0x430 [ 992.380300] ksys_mmap_pgoff+0xa5a/0xaf0 [ 992.384430] __x64_sys_mmap+0x1f1/0x260 [ 992.388444] ? align_vdso_addr+0x420/0x420 [ 992.392710] do_syscall_64+0x15b/0x230 [ 992.396642] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 992.401851] RIP: 0033:0x455aea [ 992.405055] RSP: 002b:00007ffee38dd0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 992.412796] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000455aea [ 992.420087] RDX: 0000000000000003 RSI: 0000000000200000 RDI: 0000000000000000 [ 992.427378] RBP: 0000000000000011 R08: 0000000000000011 R09: 0000000000000000 [ 992.434671] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000000 [ 992.441968] R13: 0000000000200000 R14: 0000000000000001 R15: 0000000000000000 [ 992.449358] Mem-Info: [ 992.451882] active_anon:144659 inactive_anon:78 isolated_anon:0 [ 992.451882] active_file:10 inactive_file:6 isolated_file:0 [ 992.451882] unevictable:0 dirty:0 writeback:0 unstable:0 [ 992.451882] slab_reclaimable:3295 slab_unreclaimable:8535 [ 992.451882] mapped:61449 shmem:84 pagetables:1047 bounce:0 [ 992.451882] free:18784 free_pcp:59 free_cma:0 [ 992.484553] Node 0 active_anon:578636kB inactive_anon:312kB active_file:40kB inactive_file:24kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:245796kB dirty:0kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 256000kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 992.512046] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 992.538332] lowmem_reserve[]: 0 2817 7244 7244 [ 992.543021] Node 0 DMA32 free:43928kB min:26224kB low:32780kB high:39336kB active_anon:228492kB inactive_anon:36kB active_file:36kB inactive_file:124kB unevictable:0kB writepending:0kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2048kB pagetables:1460kB bounce:0kB free_pcp:236kB local_pcp:236kB free_cma:0kB [ 992.571991] lowmem_reserve[]: 0 0 4426 4426 [ 992.576424] Node 0 Normal free:15304kB min:41208kB low:51508kB high:61808kB active_anon:350144kB inactive_anon:276kB active_file:4kB inactive_file:16kB unevictable:0kB writepending:0kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7168kB pagetables:2728kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 992.605081] lowmem_reserve[]: 0 0 0 0 [ 992.608990] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 992.622436] Node 0 DMA32: 838*4kB (UM) 3814*8kB (UM) 468*16kB (UMH) 54*32kB (UM) 11*64kB (UMH) 2*128kB (MH) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 44040kB [ 992.637221] Node 0 Normal: 3258*4kB (UME) 210*8kB (UM) 21*16kB (UMH) 4*32kB (H) 2*64kB (H) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 15304kB [ 992.651225] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 992.659864] 129 total pagecache pages [ 992.663720] 0 pages in swap cache [ 992.667249] Swap cache stats: add 0, delete 0, find 0/0 [ 992.672686] Free swap = 0kB [ 992.675750] Total swap = 0kB [ 992.678809] 1965969 pages RAM [ 992.681976] 0 pages HighMem/MovableOnly [ 992.685999] 106316 pages reserved [ 992.689500] [ pid ] uid tgid total_vm rss pgtables_bytes swapents oom_score_adj name [ 992.698206] [ 2268] 0 2268 5475 269 90112 0 -1000 udevd [ 992.706452] [ 4225] 0 4225 2493 573 61440 0 0 dhclient [ 992.715011] [ 4359] 0 4359 30604 150 126976 0 0 rsyslogd [ 992.723510] [ 4402] 0 4402 4725 47 77824 0 0 cron [ 992.731674] [ 4428] 0 4428 12490 153 139264 0 -1000 sshd [ 992.739895] [ 4452] 0 4452 3694 41 73728 0 0 getty [ 992.748136] [ 4453] 0 4453 3694 39 73728 0 0 getty [ 992.756376] [ 4454] 0 4454 3694 41 77824 0 0 getty [ 992.764620] [ 4455] 0 4455 3694 41 73728 0 0 getty [ 992.772855] [ 4456] 0 4456 3694 39 73728 0 0 getty [ 992.781083] [ 4457] 0 4457 3694 41 73728 0 0 getty [ 992.789336] [ 4458] 0 4458 3649 38 73728 0 0 getty [ 992.797568] [ 4474] 0 4474 17821 199 184320 0 0 sshd [ 992.805768] [ 4476] 0 4476 284019 142507 1949696 0 0 syz-fuzzer [ 992.814441] [26919] 0 26919 17553 14 118784 0 0 syz-executor1 [ 992.823372] [26942] 0 26942 17552 8218 126976 0 0 syz-executor1 [ 992.832302] [26958] 0 26958 17553 14 118784 0 0 syz-executor0 [ 992.841228] [26972] 0 26972 17552 8218 126976 0 0 syz-executor0 [ 992.850159] [27035] 0 27035 17553 15 118784 0 0 syz-executor5 [ 992.859087] [27036] 0 27036 17552 8219 131072 0 0 syz-executor5 [ 992.868031] [27632] 0 27632 17553 14 118784 0 0 syz-executor7 [ 992.877008] [27657] 0 27657 17552 8218 126976 0 0 syz-executor7 [ 992.885933] [28226] 0 28226 17553 14 114688 0 0 syz-executor3 [ 992.894890] [28242] 0 28242 5474 270 86016 0 -1000 udevd [ 992.903123] [28243] 0 28243 5474 270 86016 0 -1000 udevd [ 992.911351] [28247] 0 28247 17552 8218 122880 0 0 syz-executor3 [ 992.920299] [28528] 0 28528 17553 8196 118784 0 0 syz-executor6 [ 992.929228] [28548] 0 28548 16529 17 106496 0 0 syz-executor4 [ 992.938153] [28549] 0 28549 14481 16 90112 0 0 syz-executor2 [ 992.947064] Out of memory: Kill process 4476 (syz-fuzzer) score 76 or sacrifice child [ 992.955176] Killed process 27035 (syz-executor5) total-vm:70212kB, anon-rss:60kB, file-rss:0kB, shmem-rss:0kB [ 992.997562] oom_reaper: reaped process 27035 (syz-executor5), now anon-rss:0kB, file-rss:0kB, shmem-rss:0kB [ 993.188152] device bridge_slave_1 left promiscuous mode [ 993.193902] bridge0: port 2(bridge_slave_1) entered disabled state [ 993.204680] device bridge_slave_0 left promiscuous mode [ 993.211018] bridge0: port 1(bridge_slave_0) entered disabled state [ 993.229405] team0 (unregistering): Port device team_slave_1 removed [ 993.241918] team0 (unregistering): Port device team_slave_0 removed [ 993.253076] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 993.293577] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 993.319422] IPVS: ftp: loaded support on port[0] = 21 [ 993.323991] IPVS: ftp: loaded support on port[0] = 21 [ 993.340072] bond0 (unregistering): Released all slaves [ 995.238890] bridge0: port 1(bridge_slave_0) entered blocking state [ 995.245392] bridge0: port 1(bridge_slave_0) entered disabled state [ 995.252720] device bridge_slave_0 entered promiscuous mode [ 995.329138] bridge0: port 2(bridge_slave_1) entered blocking state [ 995.335642] bridge0: port 2(bridge_slave_1) entered disabled state [ 995.343649] device bridge_slave_1 entered promiscuous mode [ 995.410041] bridge0: port 1(bridge_slave_0) entered blocking state [ 995.416523] bridge0: port 1(bridge_slave_0) entered disabled state [ 995.424606] device bridge_slave_0 entered promiscuous mode [ 995.436433] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 995.477119] bridge0: port 2(bridge_slave_1) entered blocking state [ 995.483590] bridge0: port 2(bridge_slave_1) entered disabled state [ 995.491103] device bridge_slave_1 entered promiscuous mode [ 995.501530] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 995.542502] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 995.595605] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 995.661340] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 995.718370] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 995.754691] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 995.812149] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 996.060231] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 996.068120] team0: Port device team_slave_0 added [ 996.863676] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 997.369307] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 997.376260] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 997.385389] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 997.514099] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready 2018/06/22 19:45:45 executor failed 11 times: executor 6: EOF sandbox clone failed (errno 12) [ 1007.016915] BUG: unable to handle kernel NULL pointer dereference at 0000000000000050 [ 1007.024917] PGD 0 P4D 0 [ 1007.027599] Oops: 0000 [#1] SMP PTI [ 1007.031200] Dumping ftrace buffer: [ 1007.034722] (ftrace buffer empty) [ 1007.038416] Modules linked in: [ 1007.041587] CPU: 0 PID: 4478 Comm: syz-fuzzer Not tainted 4.17.0+ #9 [ 1007.048059] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1007.057399] RIP: 0010:kmsan_free_page+0x138/0x2e0 [ 1007.062216] RSP: 0018:ffff8801a4dbf5e8 EFLAGS: 00010006 [ 1007.067561] RAX: ffffea0002133f48 RBX: ffffea0002130000 RCX: 00000000000000a9 [ 1007.074832] RDX: 0000000000000000 RSI: 0000000000000009 RDI: ffffea0002508000 [ 1007.082437] RBP: ffff8801a4dbf630 R08: 0000000001080020 R09: 0000000000000002 [ 1007.089692] R10: 0000000000000000 R11: ffffffff81c36d50 R12: 0000000000000200 [ 1007.097025] R13: ffff880195620000 R14: 0000000000000009 R15: ffffea0002388000 [ 1007.104276] FS: 000000c4200283e8(0000) GS:ffff88021fc00000(0000) knlGS:0000000000000000 [ 1007.112481] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1007.118347] CR2: 0000000000000050 CR3: 000000000ac30000 CR4: 00000000001406f0 [ 1007.125596] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1007.132851] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1007.140095] Call Trace: [ 1007.142662] ? free_compound_page+0x8e/0xc0 [ 1007.146971] __free_pages_ok+0x288/0x1680 [ 1007.151100] ? kmsan_set_origin_inline+0x6b/0x120 [ 1007.155920] ? __msan_poison_alloca+0x15c/0x1d0 [ 1007.160572] free_compound_page+0x8e/0xc0 [ 1007.164704] free_transhuge_page+0x3bc/0x470 [ 1007.169090] ? split_huge_page_to_list+0x3520/0x3520 [ 1007.174174] release_pages+0x6ff/0x1650 [ 1007.178131] free_pages_and_swap_cache+0x55b/0x580 [ 1007.183038] tlb_finish_mmu+0x290/0x5c0 [ 1007.186998] exit_mmap+0x539/0x980 [ 1007.190518] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 1007.195867] ? uprobe_clear_state+0x1b0/0x270 [ 1007.200349] ? __mmput+0x3e/0x600 [ 1007.203786] __mmput+0x158/0x600 [ 1007.207135] ? mmput+0x53/0xf0 [ 1007.210319] ? __msan_get_context_state+0x20/0xf0 [ 1007.215145] mmput+0xab/0xf0 [ 1007.218143] exit_mm+0x6ed/0x7a0 [ 1007.221494] do_exit+0xc12/0x3930 [ 1007.224926] ? entry_INT80_compat+0x61/0x85 [ 1007.229231] ? yield_to_task_fair+0x260/0x260 [ 1007.233707] do_group_exit+0x1a0/0x360 [ 1007.237571] __do_sys_exit_group+0x21/0x30 [ 1007.241785] __se_sys_exit_group+0x14/0x20 [ 1007.246012] __x64_sys_exit_group+0x4c/0x50 [ 1007.250312] ? do_group_exit+0x360/0x360 [ 1007.254351] do_syscall_64+0x15b/0x230 [ 1007.258217] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1007.263381] RIP: 0033:0x47fc44 [ 1007.266635] RSP: 002b:000000c4574095d0 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 1007.274318] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000047fc44 [ 1007.281575] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000001 [ 1007.288823] RBP: 000000c457409610 R08: 0000000000000000 R09: 0000000000000000 [ 1007.296068] R10: 0000000000000000 R11: 0000000000000246 R12: 000000c45218c120 [ 1007.303315] R13: 00000000008ae7d5 R14: 000000000000000a R15: 0000000000000018 [ 1007.310567] Code: 50 01 0f 85 9d 01 00 00 48 c7 00 00 00 00 00 44 39 e1 7d 64 48 63 d1 48 8d 14 52 48 c1 e2 05 48 8b 54 13 40 48 83 c0 60 83 c1 01 <80> 7a 50 01 74 c2 0f 0b eb fe 41 83 fe 1f 0f 84 4b 01 00 00 49 [ 1007.329648] RIP: kmsan_free_page+0x138/0x2e0 RSP: ffff8801a4dbf5e8 [ 1007.335943] CR2: 0000000000000050 [ 1007.339383] ---[ end trace 461682ced56c6801 ]--- [ 1007.344116] Kernel panic - not syncing: Fatal exception [ 1007.349942] Dumping ftrace buffer: [ 1007.353458] (ftrace buffer empty) [ 1007.357145] Kernel Offset: disabled [ 1007.360746] Rebooting in 86400 seconds..