0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) socket$nl_generic(0x10, 0x3, 0x10) 19:32:10 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) 19:32:10 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 19:32:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) getpeername$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000200)=0xe0) 19:32:11 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) connect$netlink(0xffffffffffffffff, &(0x7f0000000040)=@kern={0x10}, 0xc) 19:32:11 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) gettid() 19:32:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) socket$nl_generic(0x10, 0x3, 0x10) 19:32:11 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ppp\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000700)={'broute\x00'}, &(0x7f0000000780)=0x78) 19:32:11 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) 19:32:11 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 19:32:11 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) connect$netlink(0xffffffffffffffff, &(0x7f0000000040)=@kern={0x10}, 0xc) 19:32:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) getpeername$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000200)=0xe0) 19:32:11 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000240)) 19:32:11 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket$inet6(0xa, 0x0, 0x0) gettid() 19:32:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) socket$nl_generic(0x10, 0x3, 0x10) 19:32:11 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) 19:32:11 executing program 5: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 19:32:11 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f0000000040)=@kern={0x10}, 0xc) 19:32:11 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ppp\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000700)={'broute\x00'}, &(0x7f0000000780)=0x78) 19:32:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) getpeername$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000200)=0xe0) 19:32:11 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f0000000040)=@kern={0x10}, 0xc) [ 746.762595] audit: type=1326 audit(1529695931.760:1580): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14452 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:32:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) socket$nl_generic(0x10, 0x3, 0x10) 19:32:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) 19:32:11 executing program 5: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 19:32:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) getpeername$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000200)=0xe0) 19:32:11 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ppp\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000700)={'broute\x00'}, &(0x7f0000000780)=0x78) 19:32:11 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket$inet6(0xa, 0x0, 0x0) gettid() 19:32:12 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f0000000040)=@kern={0x10}, 0xc) 19:32:12 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket$inet6(0xa, 0x0, 0x0) gettid() 19:32:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) socket$nl_generic(0x10, 0x3, 0x10) 19:32:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) getpeername$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000200)=0xe0) 19:32:12 executing program 5: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 19:32:12 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ppp\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000700)={'broute\x00'}, &(0x7f0000000780)=0x78) 19:32:12 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f0000000040)=@kern={0x10}, 0xc) 19:32:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) 19:32:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000), 0x4) 19:32:12 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 19:32:12 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f0000000040)=@kern={0x10}, 0xc) 19:32:12 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000040)) getpeername$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000200)=0xe0) 19:32:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) 19:32:12 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) gettid() 19:32:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) socket$nl_generic(0x10, 0x3, 0x10) 19:32:12 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000700)={'broute\x00'}, &(0x7f0000000780)=0x78) 19:32:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000), 0x4) 19:32:13 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000040)) getpeername$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000200)=0xe0) 19:32:13 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f0000000040)=@kern={0x10}, 0xc) 19:32:13 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 19:32:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) 19:32:13 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) socket$nl_generic(0x10, 0x3, 0x10) 19:32:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000700)={'broute\x00'}, &(0x7f0000000780)=0x78) 19:32:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000), 0x4) 19:32:13 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f0000000040)=@kern={0x10}, 0xc) 19:32:13 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 19:32:13 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) gettid() 19:32:13 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000040)) getpeername$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000200)=0xe0) 19:32:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) 19:32:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000700)={'broute\x00'}, &(0x7f0000000780)=0x78) 19:32:13 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) socket$nl_generic(0x10, 0x3, 0x10) 19:32:13 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f0000000040)=@kern={0x10}, 0xc) 19:32:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000), 0x4) 19:32:13 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 19:32:13 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) getpeername$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000200)=0xe0) 19:32:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) [ 748.649197] audit: type=1326 audit(1529695933.647:1581): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14577 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:32:13 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) gettid() 19:32:13 executing program 7: openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ppp\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000700)={'broute\x00'}, &(0x7f0000000780)=0x78) 19:32:13 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f0000000040)=@kern={0x10}, 0xc) 19:32:13 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 19:32:13 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) getpeername$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000200)=0xe0) 19:32:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) 19:32:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000), 0x4) 19:32:14 executing program 7: openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ppp\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000700)={'broute\x00'}, &(0x7f0000000780)=0x78) 19:32:14 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 19:32:14 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f0000000040)=@kern={0x10}, 0xc) [ 748.990635] audit: type=1326 audit(1529695933.989:1582): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14612 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:32:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000), 0x4) 19:32:14 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) socket$nl_generic(0x10, 0x3, 0x10) 19:32:14 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) gettid() 19:32:14 executing program 7: openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ppp\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000700)={'broute\x00'}, &(0x7f0000000780)=0x78) 19:32:14 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) getpeername$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000200)=0xe0) 19:32:14 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f0000000040)=@kern={0x10}, 0xc) 19:32:14 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 19:32:14 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ppp\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000700)={'broute\x00'}, &(0x7f0000000780)=0x78) [ 749.597216] audit: type=1326 audit(1529695934.595:1583): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14637 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:32:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) getpeername$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000200)=0xe0) [ 749.669277] audit: type=1326 audit(1529695934.633:1584): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14646 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:32:14 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 19:32:14 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f0000000040)=@kern={0x10}, 0xc) 19:32:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) 19:32:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000), 0x4) 19:32:14 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ppp\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000700)={'broute\x00'}, &(0x7f0000000780)=0x78) 19:32:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) getpeername$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000200)=0xe0) 19:32:14 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 19:32:14 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f0000000040)=@kern={0x10}, 0xc) [ 749.958159] audit: type=1326 audit(1529695934.956:1585): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14668 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 750.029783] audit: type=1326 audit(1529695935.017:1586): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14676 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:32:15 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) socket$nl_generic(0x10, 0x3, 0x10) 19:32:15 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 19:32:15 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ppp\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000700)={'broute\x00'}, &(0x7f0000000780)=0x78) 19:32:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) getpeername$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000200)=0xe0) 19:32:15 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000), 0x4) 19:32:15 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) gettid() [ 750.554384] audit: type=1326 audit(1529695935.553:1587): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14687 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:32:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023d}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) getpeername$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000200)=0xe0) 19:32:15 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000), 0x4) 19:32:15 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ppp\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000700)={'broute\x00'}, &(0x7f0000000780)=0x78) [ 750.598277] audit: type=1326 audit(1529695935.577:1588): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14691 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 750.618289] audit: type=1326 audit(1529695935.590:1589): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14698 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:32:15 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ppp\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000700)={'broute\x00'}, &(0x7f0000000780)=0x78) 19:32:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) 19:32:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023d}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) getpeername$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000200)=0xe0) 19:32:15 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000), 0x4) 19:32:15 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ppp\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000700)={'broute\x00'}, &(0x7f0000000780)=0x78) 19:32:15 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f0000000040)=@kern={0x10}, 0xc) [ 750.955594] audit: type=1326 audit(1529695935.954:1590): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14720 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:32:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023d}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) getpeername$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000200)=0xe0) 19:32:16 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) gettid() 19:32:16 executing program 0: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000), 0x4) 19:32:16 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ppp\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000700)={'broute\x00'}, &(0x7f0000000780)=0x78) 19:32:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) getpeername$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000200)=0xe0) 19:32:16 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 19:32:16 executing program 0: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000), 0x4) 19:32:16 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ppp\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000700)={'broute\x00'}, &(0x7f0000000780)=0x78) 19:32:16 executing program 0: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000), 0x4) 19:32:16 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ppp\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000700)={'broute\x00'}, &(0x7f0000000780)=0x78) 19:32:16 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ppp\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000700)={'broute\x00'}, &(0x7f0000000780)=0x78) 19:32:16 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f0000000040)=@kern={0x10}, 0xc) 19:32:16 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000), 0x4) 19:32:16 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000), 0x4) 19:32:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000), 0x4) 19:32:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000), 0x4) 19:32:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000), 0x4) 19:32:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) getpeername$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000200)=0xe0) 19:32:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000), 0x4) 19:32:17 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 19:32:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000), 0x4) 19:32:17 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ppp\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000700)={'broute\x00'}, &(0x7f0000000780)=0x78) 19:32:18 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) accept$inet6(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x0, 0x0, @remote}, &(0x7f00000000c0)=0x1c) poll(&(0x7f0000000440), 0x0, 0x0) 19:32:18 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) dup(0xffffffffffffffff) 19:32:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000080)) sched_setparam(0x0, &(0x7f0000000300)) 19:32:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) creat(&(0x7f0000000540)='./file0\x00', 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000580)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) 19:32:18 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) accept$inet6(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x0, 0x0, @remote}, &(0x7f00000000c0)=0x1c) poll(&(0x7f0000000440), 0x0, 0x0) 19:32:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000080)) sched_setparam(0x0, &(0x7f0000000300)) 19:32:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x28, &(0x7f0000000040)}, 0x10) 19:32:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) getpeername$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000200)=0xe0) 19:32:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000240)}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}) 19:32:18 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000), 0x4) 19:32:18 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f00000001c0)=0x2, 0x4) 19:32:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ppp\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000700)={'broute\x00'}, &(0x7f0000000780)=0x78) 19:32:18 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) accept$inet6(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x0, 0x0, @remote}, &(0x7f00000000c0)=0x1c) poll(&(0x7f0000000440), 0x0, 0x0) 19:32:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) unlink(&(0x7f0000000040)='./file0\x00') 19:32:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000040), 0x10) [ 753.801210] kauditd_printk_skb: 12 callbacks suppressed [ 753.801234] audit: type=1326 audit(1529695938.799:1603): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14851 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:32:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000240)}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}) 19:32:18 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f00000001c0)=0x2, 0x4) 19:32:18 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) accept$inet6(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x0, 0x0, @remote}, &(0x7f00000000c0)=0x1c) poll(&(0x7f0000000440), 0x0, 0x0) 19:32:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) unlink(&(0x7f0000000040)='./file0\x00') 19:32:19 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000240)}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}) 19:32:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) 19:32:19 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f00000001c0)=0x2, 0x4) 19:32:19 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) unlink(&(0x7f0000000040)='./file0\x00') 19:32:19 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f00000001c0)=0x2, 0x4) 19:32:19 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) poll(&(0x7f0000000440), 0x0, 0x0) 19:32:19 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000), 0x4) 19:32:19 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000240)}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}) [ 754.588531] audit: type=1326 audit(1529695939.587:1604): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14903 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:32:19 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}) 19:32:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) 19:32:19 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) unlink(&(0x7f0000000040)='./file0\x00') 19:32:19 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) seccomp(0x0, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000001c0)}) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) 19:32:19 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) poll(&(0x7f0000000440), 0x0, 0x0) 19:32:19 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f00000001c0)=0x2, 0x4) 19:32:19 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0)) 19:32:19 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f00000001c0)=0x2, 0x4) 19:32:19 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}) 19:32:19 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0)) 19:32:19 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) poll(&(0x7f0000000440), 0x0, 0x0) 19:32:19 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) unlink(&(0x7f0000000040)='./file0\x00') 19:32:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) 19:32:20 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) seccomp(0x0, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000001c0)}) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) 19:32:20 executing program 4: accept$inet6(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x0, 0x0, @remote}, &(0x7f00000000c0)=0x1c) poll(&(0x7f0000000440), 0x0, 0x0) 19:32:20 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0)) 19:32:20 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f00000001c0)=0x2, 0x4) 19:32:20 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) unlink(&(0x7f0000000040)='./file0\x00') 19:32:20 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) seccomp(0x0, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000001c0)}) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) 19:32:20 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}) 19:32:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) 19:32:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) lremovexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@known='trusted.syz\x00') 19:32:20 executing program 4: accept$inet6(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x0, 0x0, @remote}, &(0x7f00000000c0)=0x1c) poll(&(0x7f0000000440), 0x0, 0x0) 19:32:20 executing program 5: seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000240)}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}) 19:32:20 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) unlink(&(0x7f0000000040)='./file0\x00') 19:32:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) 19:32:20 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f00000001c0)=0x2, 0x4) 19:32:20 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) seccomp(0x0, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000001c0)}) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) 19:32:20 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0)) 19:32:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) lremovexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@known='trusted.syz\x00') 19:32:20 executing program 4: accept$inet6(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x0, 0x0, @remote}, &(0x7f00000000c0)=0x1c) poll(&(0x7f0000000440), 0x0, 0x0) 19:32:20 executing program 5: seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000240)}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}) 19:32:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) 19:32:20 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f00000001c0)=0x2, 0x4) 19:32:20 executing program 6: socket$inet_udp(0x2, 0x2, 0x0) unlink(&(0x7f0000000040)='./file0\x00') 19:32:21 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) 19:32:21 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) accept$inet6(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x0, 0x0, @remote}, &(0x7f00000000c0)=0x1c) poll(&(0x7f0000000440), 0x0, 0x0) 19:32:21 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0)) 19:32:21 executing program 5: seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000240)}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}) 19:32:21 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) lremovexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@known='trusted.syz\x00') 19:32:21 executing program 6: socket$inet_udp(0x2, 0x2, 0x0) unlink(&(0x7f0000000040)='./file0\x00') 19:32:21 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f00000001c0)=0x2, 0x4) 19:32:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) 19:32:21 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) 19:32:21 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) accept$inet6(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x0, 0x0, @remote}, &(0x7f00000000c0)=0x1c) poll(&(0x7f0000000440), 0x0, 0x0) 19:32:21 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0)) 19:32:21 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000240)}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}) 19:32:21 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) lremovexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@known='trusted.syz\x00') 19:32:21 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f00000001c0)=0x2, 0x4) 19:32:21 executing program 6: socket$inet_udp(0x2, 0x2, 0x0) unlink(&(0x7f0000000040)='./file0\x00') 19:32:21 executing program 1: socket$inet(0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) 19:32:21 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) 19:32:21 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) accept$inet6(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x0, 0x0, @remote}, &(0x7f00000000c0)=0x1c) poll(&(0x7f0000000440), 0x0, 0x0) 19:32:21 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000240)}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}) 19:32:21 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0)) 19:32:21 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f00000001c0)=0x2, 0x4) 19:32:21 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) unlink(&(0x7f0000000040)='./file0\x00') 19:32:21 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) lremovexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@known='trusted.syz\x00') 19:32:21 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000001c0)}) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) 19:32:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) accept$inet6(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x0, 0x0, @remote}, &(0x7f00000000c0)=0x1c) poll(&(0x7f0000000440), 0x0, 0x0) 19:32:21 executing program 1: socket$inet(0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) 19:32:22 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000240)}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}) 19:32:22 executing program 7: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0)) 19:32:22 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f00000001c0)=0x2, 0x4) 19:32:22 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) lremovexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@known='trusted.syz\x00') 19:32:22 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) unlink(&(0x7f0000000040)='./file0\x00') 19:32:22 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000001c0)}) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) 19:32:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) accept$inet6(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x0, 0x0, @remote}, &(0x7f00000000c0)=0x1c) poll(&(0x7f0000000440), 0x0, 0x0) 19:32:22 executing program 1: socket$inet(0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) 19:32:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000240)}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}) 19:32:22 executing program 7: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0)) 19:32:22 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f00000001c0)=0x2, 0x4) 19:32:22 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) unlink(&(0x7f0000000040)='./file0\x00') 19:32:22 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000001c0)}) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) 19:32:22 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) lremovexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@known='trusted.syz\x00') 19:32:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) accept$inet6(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x0, 0x0, @remote}, &(0x7f00000000c0)=0x1c) poll(&(0x7f0000000440), 0x0, 0x0) 19:32:22 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) 19:32:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000240)}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}) 19:32:22 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f00000001c0)=0x2, 0x4) 19:32:22 executing program 2: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) seccomp(0x0, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000001c0)}) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) 19:32:22 executing program 7: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0)) 19:32:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet_udp(0x2, 0x2, 0x0) unlink(&(0x7f0000000040)='./file0\x00') 19:32:22 executing program 0: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) lremovexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@known='trusted.syz\x00') 19:32:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050092}]}) accept$inet6(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x0, 0x0, @remote}, &(0x7f00000000c0)=0x1c) poll(&(0x7f0000000440), 0x0, 0x0) 19:32:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000240)}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}) 19:32:22 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f00000001c0)=0x2, 0x4) 19:32:22 executing program 2: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) seccomp(0x0, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000001c0)}) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) 19:32:22 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) 19:32:22 executing program 0: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) lremovexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@known='trusted.syz\x00') 19:32:22 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0)) 19:32:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet_udp(0x2, 0x2, 0x0) unlink(&(0x7f0000000040)='./file0\x00') 19:32:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050092}]}) accept$inet6(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x0, 0x0, @remote}, &(0x7f00000000c0)=0x1c) poll(&(0x7f0000000440), 0x0, 0x0) 19:32:23 executing program 2: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) seccomp(0x0, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000001c0)}) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) 19:32:23 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f00000001c0)=0x2, 0x4) 19:32:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023d}]}) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000240)}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}) 19:32:23 executing program 0: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) lremovexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@known='trusted.syz\x00') 19:32:23 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0)) 19:32:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet_udp(0x2, 0x2, 0x0) unlink(&(0x7f0000000040)='./file0\x00') 19:32:23 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) 19:32:23 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050092}]}) accept$inet6(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x0, 0x0, @remote}, &(0x7f00000000c0)=0x1c) poll(&(0x7f0000000440), 0x0, 0x0) 19:32:23 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000001c0)}) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) 19:32:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023d}]}) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000240)}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}) 19:32:23 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) lremovexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@known='trusted.syz\x00') 19:32:23 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f00000001c0)=0x2, 0x4) 19:32:23 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0)) 19:32:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) unlink(&(0x7f0000000040)='./file0\x00') 19:32:23 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) accept$inet6(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x0, 0x0, @remote}, &(0x7f00000000c0)=0x1c) poll(&(0x7f0000000440), 0x0, 0x0) 19:32:23 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) lremovexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@known='trusted.syz\x00') 19:32:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023d}]}) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000240)}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}) 19:32:23 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000001c0)}) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) 19:32:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) 19:32:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0)) 19:32:23 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f00000001c0)=0x2, 0x4) [ 758.638868] audit: type=1326 audit(1529695943.637:1605): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15240 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:32:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000240)}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}) 19:32:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) unlink(&(0x7f0000000040)='./file0\x00') 19:32:23 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000001c0)}) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) 19:32:23 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) lremovexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@known='trusted.syz\x00') [ 758.846144] audit: type=1326 audit(1529695943.844:1606): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15260 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:32:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0)) 19:32:23 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f00000001c0)=0x2, 0x4) 19:32:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) 19:32:24 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) unlink(&(0x7f0000000040)='./file0\x00') 19:32:24 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023e}]}) seccomp(0x0, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000001c0)}) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) [ 759.020311] audit: type=1326 audit(1529695944.018:1607): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15274 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:32:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) lremovexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@known='trusted.syz\x00') 19:32:24 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_udp(0x2, 0x2, 0x0) unlink(&(0x7f0000000040)='./file0\x00') 19:32:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0)) 19:32:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) 19:32:24 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) accept$inet6(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x0, 0x0, @remote}, &(0x7f00000000c0)=0x1c) poll(&(0x7f0000000440), 0x0, 0x0) 19:32:24 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023e}]}) seccomp(0x0, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000001c0)}) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) [ 759.575868] audit: type=1326 audit(1529695944.574:1608): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15294 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:32:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) lremovexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@known='trusted.syz\x00') [ 759.623572] audit: type=1326 audit(1529695944.616:1609): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15299 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:32:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0)) 19:32:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000240)}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}) 19:32:24 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023e}]}) seccomp(0x0, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000001c0)}) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) 19:32:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) 19:32:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) lremovexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@known='trusted.syz\x00') [ 759.857045] audit: type=1326 audit(1529695944.846:1610): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15324 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:32:24 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f00000001c0)=0x2, 0x4) 19:32:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0)) 19:32:24 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000001c0)}) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) 19:32:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) lremovexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@known='trusted.syz\x00') 19:32:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) [ 759.990330] audit: type=1326 audit(1529695944.988:1611): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15332 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 760.077936] audit: type=1326 audit(1529695945.055:1612): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15339 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:32:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) accept$inet6(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x0, 0x0, @remote}, &(0x7f00000000c0)=0x1c) poll(&(0x7f0000000440), 0x0, 0x0) 19:32:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0)) 19:32:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) lremovexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@known='trusted.syz\x00') 19:32:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) 19:32:25 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_udp(0x2, 0x2, 0x0) unlink(&(0x7f0000000040)='./file0\x00') 19:32:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) lremovexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@known='trusted.syz\x00') [ 760.567506] audit: type=1326 audit(1529695945.566:1613): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15355 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:32:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0)) [ 760.628857] audit: type=1326 audit(1529695945.601:1614): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15364 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:32:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000240)}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}) 19:32:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) 19:32:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) lremovexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@known='trusted.syz\x00') [ 760.720698] audit: type=1326 audit(1529695945.719:1615): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15372 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:32:25 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000001c0)}) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) 19:32:25 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f00000001c0)=0x2, 0x4) 19:32:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_udp(0x2, 0x2, 0x0) unlink(&(0x7f0000000040)='./file0\x00') 19:32:26 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) seccomp(0x0, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000001c0)}) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, &(0x7f0000000080)) 19:32:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0)) 19:32:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) 19:32:26 executing program 5: io_submit(0x0, 0x1fffffffffffffd0, &(0x7f0000000000)) 19:32:26 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) lremovexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@known='trusted.syz\x00') 19:32:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) 19:32:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) 19:32:26 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000001c0)}) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) 19:32:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000180)}, 0x10) 19:32:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) getdents(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b) 19:32:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) 19:32:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000180)}, 0x10) 19:32:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) getdents(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b) 19:32:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) 19:32:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000180)}, 0x10) 19:32:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) getdents(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b) 19:32:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) unshare(0x0) 19:32:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0)) 19:32:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) 19:32:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000180)}, 0x10) 19:32:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) lremovexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@known='trusted.syz\x00') 19:32:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) getdents(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b) 19:32:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) unshare(0x0) 19:32:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000180)}, 0x10) 19:32:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) 19:32:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) 19:32:27 executing program 2: r0 = socket(0x200000000010, 0x2, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000100)=0x10) 19:32:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) unshare(0x0) 19:32:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000180)}, 0x10) 19:32:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) getdents(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b) 19:32:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) 19:32:28 executing program 2: r0 = socket(0x200000000010, 0x2, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000100)=0x10) 19:32:28 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) unshare(0x0) 19:32:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000180)}, 0x10) 19:32:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) getdents(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b) 19:32:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f00000009c0)) 19:32:28 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000080)=@add_del={0x2, &(0x7f0000000000)='vcan0\x00'}) 19:32:28 executing program 4: getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) 19:32:28 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) unshare(0x0) 19:32:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) modify_ldt$read_default(0x2, &(0x7f0000000140)=""/188, 0xbc) 19:32:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000dc0)={0x2}) 19:32:28 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000180)}, 0x10) 19:32:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) getdents(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b) 19:32:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) accept$packet(0xffffffffffffff9c, 0x0, &(0x7f00000000c0)) socket$packet(0x11, 0x0, 0x300) 19:32:28 executing program 4: getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) 19:32:28 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) unshare(0x0) 19:32:29 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000180)}, 0x10) 19:32:29 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) modify_ldt$read_default(0x2, &(0x7f0000000140)=""/188, 0xbc) 19:32:29 executing program 4: getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) 19:32:29 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000040)) 19:32:29 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) getdents(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b) 19:32:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000dc0)={0x2}) 19:32:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) accept$packet(0xffffffffffffff9c, 0x0, &(0x7f00000000c0)) socket$packet(0x11, 0x0, 0x300) 19:32:29 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) getdents(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b) 19:32:29 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000180)}, 0x10) 19:32:29 executing program 4: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) 19:32:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) unshare(0x0) 19:32:29 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) modify_ldt$read_default(0x2, &(0x7f0000000140)=""/188, 0xbc) 19:32:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000dc0)={0x2}) 19:32:29 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000040)) 19:32:29 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) getdents(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b) 19:32:29 executing program 5: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000180)}, 0x10) 19:32:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) accept$packet(0xffffffffffffff9c, 0x0, &(0x7f00000000c0)) socket$packet(0x11, 0x0, 0x300) 19:32:29 executing program 4: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) 19:32:29 executing program 6: getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) unshare(0x0) 19:32:29 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) modify_ldt$read_default(0x2, &(0x7f0000000140)=""/188, 0xbc) 19:32:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000dc0)={0x2}) 19:32:29 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) getdents(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b) 19:32:29 executing program 5: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000180)}, 0x10) 19:32:29 executing program 4: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) 19:32:29 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000040)) 19:32:29 executing program 6: getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) unshare(0x0) 19:32:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) accept$packet(0xffffffffffffff9c, 0x0, &(0x7f00000000c0)) socket$packet(0x11, 0x0, 0x300) 19:32:29 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0x50242}]}) modify_ldt$read_default(0x2, &(0x7f0000000140)=""/188, 0xbc) 19:32:30 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000dc0)={0x2}) 19:32:30 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) getdents(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b) 19:32:30 executing program 6: getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) unshare(0x0) 19:32:30 executing program 5: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000180)}, 0x10) 19:32:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) 19:32:30 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000040)) 19:32:30 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$packet(0x11, 0x0, 0x300) 19:32:30 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0x50242}]}) modify_ldt$read_default(0x2, &(0x7f0000000140)=""/188, 0xbc) 19:32:30 executing program 6: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) unshare(0x0) 19:32:30 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) getdents(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b) 19:32:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000180)}, 0x10) 19:32:30 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000dc0)={0x2}) 19:32:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) 19:32:30 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000040)) 19:32:30 executing program 6: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) unshare(0x0) 19:32:30 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0x50242}]}) modify_ldt$read_default(0x2, &(0x7f0000000140)=""/188, 0xbc) 19:32:30 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$packet(0x11, 0x0, 0x300) 19:32:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet_udp(0x2, 0x2, 0x0) getdents(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b) 19:32:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000180)}, 0x10) 19:32:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) 19:32:30 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000dc0)={0x2}) 19:32:30 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000040)) 19:32:30 executing program 6: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) unshare(0x0) 19:32:30 executing program 2: getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) modify_ldt$read_default(0x2, &(0x7f0000000140)=""/188, 0xbc) 19:32:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000180)}, 0x10) 19:32:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet_udp(0x2, 0x2, 0x0) getdents(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b) 19:32:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) 19:32:30 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$packet(0x11, 0x0, 0x300) 19:32:30 executing program 0: mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000dc0)={0x2}) 19:32:30 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) unshare(0x0) 19:32:31 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000040)) 19:32:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet_udp(0x2, 0x2, 0x0) getdents(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b) 19:32:31 executing program 2: getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) modify_ldt$read_default(0x2, &(0x7f0000000140)=""/188, 0xbc) 19:32:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000180)}, 0x10) 19:32:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) 19:32:31 executing program 1: accept$packet(0xffffffffffffff9c, 0x0, &(0x7f00000000c0)) socket$packet(0x11, 0x0, 0x300) 19:32:31 executing program 0: mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000dc0)={0x2}) 19:32:31 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) unshare(0x0) 19:32:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) getdents(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b) 19:32:31 executing program 2: getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) modify_ldt$read_default(0x2, &(0x7f0000000140)=""/188, 0xbc) 19:32:31 executing program 7: socket$inet6(0xa, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000040)) 19:32:31 executing program 1: accept$packet(0xffffffffffffff9c, 0x0, &(0x7f00000000c0)) socket$packet(0x11, 0x0, 0x300) 19:32:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000180)}, 0x10) 19:32:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) 19:32:31 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) unshare(0x0) 19:32:31 executing program 0: mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000dc0)={0x2}) 19:32:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) getdents(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b) 19:32:31 executing program 2: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) modify_ldt$read_default(0x2, &(0x7f0000000140)=""/188, 0xbc) 19:32:31 executing program 1: accept$packet(0xffffffffffffff9c, 0x0, &(0x7f00000000c0)) socket$packet(0x11, 0x0, 0x300) 19:32:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) 19:32:31 executing program 7: socket$inet6(0xa, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000040)) 19:32:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000180)}, 0x10) 19:32:31 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000dc0)={0x2}) 19:32:31 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) unshare(0x0) 19:32:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) getdents(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b) 19:32:31 executing program 2: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) modify_ldt$read_default(0x2, &(0x7f0000000140)=""/188, 0xbc) [ 766.744136] kauditd_printk_skb: 13 callbacks suppressed [ 766.744158] audit: type=1326 audit(1529695951.742:1629): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15795 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:32:31 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) accept$packet(0xffffffffffffff9c, 0x0, &(0x7f00000000c0)) socket$packet(0x11, 0x0, 0x300) 19:32:31 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000dc0)={0x2}) 19:32:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000180)}, 0x10) 19:32:31 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) unshare(0x0) 19:32:32 executing program 2: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) modify_ldt$read_default(0x2, &(0x7f0000000140)=""/188, 0xbc) 19:32:32 executing program 7: socket$inet6(0xa, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000040)) [ 766.981154] audit: type=1326 audit(1529695951.979:1630): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15820 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:32:32 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_udp(0x2, 0x2, 0x0) getdents(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b) 19:32:32 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) accept$packet(0xffffffffffffff9c, 0x0, &(0x7f00000000c0)) socket$packet(0x11, 0x0, 0x300) 19:32:32 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) unshare(0x0) [ 767.170025] audit: type=1326 audit(1529695952.157:1631): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15836 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:32:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) 19:32:32 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000dc0)={0x2}) 19:32:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f0000000200)}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) modify_ldt$read_default(0x2, &(0x7f0000000140)=""/188, 0xbc) 19:32:32 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000040)) 19:32:32 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) accept$packet(0xffffffffffffff9c, 0x0, &(0x7f00000000c0)) socket$packet(0x11, 0x0, 0x300) 19:32:32 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) unshare(0x0) 19:32:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) accept$packet(0xffffffffffffff9c, 0x0, &(0x7f00000000c0)) socket$packet(0x11, 0x0, 0x300) [ 767.664592] audit: type=1326 audit(1529695952.663:1632): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15851 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:32:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f0000000200)}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) modify_ldt$read_default(0x2, &(0x7f0000000140)=""/188, 0xbc) [ 767.728992] audit: type=1326 audit(1529695952.692:1633): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15857 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:32:32 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000dc0)={0x2}) 19:32:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000180)}, 0x10) 19:32:32 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000040)) 19:32:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) accept$packet(0xffffffffffffff9c, 0x0, &(0x7f00000000c0)) socket$packet(0x11, 0x0, 0x300) 19:32:32 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000dc0)={0x2}) [ 767.998420] audit: type=1326 audit(1529695952.997:1634): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15884 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:32:33 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_udp(0x2, 0x2, 0x0) getdents(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b) 19:32:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f0000000200)}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) modify_ldt$read_default(0x2, &(0x7f0000000140)=""/188, 0xbc) 19:32:33 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000dc0)={0x2}) [ 768.195599] audit: type=1326 audit(1529695953.194:1635): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15898 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:32:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) 19:32:33 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000040)) 19:32:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) accept$packet(0xffffffffffffff9c, 0x0, &(0x7f00000000c0)) socket$packet(0x11, 0x0, 0x300) 19:32:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) modify_ldt$read_default(0x2, &(0x7f0000000140)=""/188, 0xbc) 19:32:33 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501cd}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000dc0)={0x2}) 19:32:33 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) unshare(0x0) [ 768.618171] audit: type=1326 audit(1529695953.616:1636): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15905 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:32:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) accept$packet(0xffffffffffffff9c, 0x0, &(0x7f00000000c0)) socket$packet(0x11, 0x0, 0x300) [ 768.681277] audit: type=1326 audit(1529695953.672:1637): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15911 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:32:33 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501cd}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000dc0)={0x2}) 19:32:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) modify_ldt$read_default(0x2, &(0x7f0000000140)=""/188, 0xbc) 19:32:33 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000180)}, 0x10) 19:32:33 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket$inet6(0xa, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000040)) 19:32:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) accept$packet(0xffffffffffffff9c, 0x0, &(0x7f00000000c0)) socket$packet(0x11, 0x0, 0x300) 19:32:33 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501cd}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000dc0)={0x2}) [ 768.996212] audit: type=1326 audit(1529695953.993:1638): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15939 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:32:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_udp(0x2, 0x2, 0x0) getdents(0xffffffffffffffff, &(0x7f00000001c0)=""/59, 0x3b) 19:32:34 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) modify_ldt$read_default(0x2, &(0x7f0000000140)=""/188, 0xbc) 19:32:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) accept$packet(0xffffffffffffff9c, 0x0, &(0x7f00000000c0)) socket$packet(0x11, 0x0, 0x300) 19:32:34 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f0000000200)=[{0x6}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) modify_ldt$read_default(0x2, &(0x7f0000000140)=""/188, 0xbc) 19:32:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000dc0)={0x2}) 19:32:34 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket$inet6(0xa, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000040)) 19:32:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) accept$packet(0xffffffffffffff9c, 0x0, &(0x7f00000000c0)) socket$packet(0x11, 0x0, 0x300) 19:32:34 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 19:32:34 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) unshare(0x0) 19:32:34 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket$inet6(0xa, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000040)) 19:32:34 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 19:32:34 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000040)) 19:32:34 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 19:32:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000280)) 19:32:34 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000040)) 19:32:35 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 19:32:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000280)) 19:32:35 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000040)) 19:32:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000180)) 19:32:35 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000040)) 19:32:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f0000000200)=[{0x6}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) modify_ldt$read_default(0x2, &(0x7f0000000140)=""/188, 0xbc) 19:32:35 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 19:32:35 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x251, r0, 0x0) getsockopt$packet_int(r0, 0x107, 0xb, &(0x7f00000001c0), &(0x7f00000041c0)=0x4) r1 = socket(0x10, 0x2, 0x0) getpeername$inet6(r1, &(0x7f0000000100)={0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0xfffffffffffffdb0) getpeername$inet(r1, &(0x7f0000000000)={0x0, 0x0, @local}, &(0x7f0000000080)=0xffffffffffffff8e) 19:32:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000280)) 19:32:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) accept$packet(0xffffffffffffff9c, 0x0, &(0x7f00000000c0)) socket$packet(0x11, 0x0, 0x300) 19:32:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000dc0)={0x2}) 19:32:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) inotify_init() socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000640)) 19:32:35 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) 19:32:35 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 19:32:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000280)) 19:32:35 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000140), &(0x7f00000001c0)=0x14) 19:32:35 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 19:32:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 19:32:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000280)) 19:32:36 executing program 4: openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 19:32:36 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000140), &(0x7f00000001c0)=0x14) 19:32:36 executing program 4: openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 19:32:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f0000000200)=[{0x6}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) modify_ldt$read_default(0x2, &(0x7f0000000140)=""/188, 0xbc) 19:32:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 19:32:36 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000040)) 19:32:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) accept$packet(0xffffffffffffff9c, 0x0, &(0x7f00000000c0)) socket$packet(0x11, 0x0, 0x300) 19:32:36 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000dc0)={0x2}) 19:32:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000280)) 19:32:36 executing program 4: openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 19:32:36 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000140), &(0x7f00000001c0)=0x14) 19:32:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 19:32:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000280)) 19:32:36 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 19:32:36 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000140), &(0x7f00000001c0)=0x14) 19:32:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 19:32:36 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 19:32:37 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000280)) 19:32:37 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000140), &(0x7f00000001c0)=0x14) 19:32:37 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000040)) 19:32:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) syz_fuseblk_mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 19:32:37 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000280)) [ 772.490174] kauditd_printk_skb: 13 callbacks suppressed [ 772.490195] audit: type=1326 audit(1529695957.488:1652): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16147 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:32:37 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000280)) 19:32:37 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) gettid() socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) 19:32:37 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 19:32:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050095}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000140)={{0x2, 0x0, @rand_addr}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x0, {0x2}, 'teql0\x00'}) 19:32:37 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000140), &(0x7f00000001c0)=0x14) 19:32:37 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000280)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000180)) 19:32:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) syz_fuseblk_mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 19:32:37 executing program 5: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000280)) 19:32:37 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 19:32:37 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000140), &(0x7f00000001c0)=0x14) 19:32:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) syz_fuseblk_mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 19:32:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050095}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000140)={{0x2, 0x0, @rand_addr}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x0, {0x2}, 'teql0\x00'}) 19:32:37 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) gettid() socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) 19:32:38 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) gettid() socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) 19:32:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000280)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000180)) 19:32:38 executing program 5: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000280)) 19:32:38 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 19:32:38 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000140), &(0x7f00000001c0)=0x14) 19:32:38 executing program 6: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 19:32:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050095}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000140)={{0x2, 0x0, @rand_addr}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x0, {0x2}, 'teql0\x00'}) 19:32:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) eventfd(0x0) socket$l2tp(0x18, 0x1, 0x1) 19:32:38 executing program 5: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000280)) 19:32:38 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000140), &(0x7f00000001c0)=0x14) 19:32:38 executing program 6: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 19:32:38 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 19:32:38 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) gettid() socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) 19:32:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000280)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000180)) 19:32:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050095}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000140)={{0x2, 0x0, @rand_addr}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x0, {0x2}, 'teql0\x00'}) 19:32:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) eventfd(0x0) socket$l2tp(0x18, 0x1, 0x1) 19:32:38 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000140), &(0x7f00000001c0)=0x14) 19:32:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000280)) 19:32:38 executing program 6: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 19:32:38 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 19:32:38 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) 19:32:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050095}]}) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000140)={{0x2, 0x0, @rand_addr}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x0, {0x2}, 'teql0\x00'}) 19:32:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000280)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000180)) 19:32:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000280)) 19:32:39 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000140), &(0x7f00000001c0)=0x14) 19:32:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) eventfd(0x0) socket$l2tp(0x18, 0x1, 0x1) 19:32:39 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 19:32:39 executing program 6: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 19:32:39 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) 19:32:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050095}]}) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000140)={{0x2, 0x0, @rand_addr}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x0, {0x2}, 'teql0\x00'}) 19:32:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000280)) 19:32:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000180)) 19:32:39 executing program 6: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 19:32:39 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000140), &(0x7f00000001c0)=0x14) 19:32:39 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 19:32:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) eventfd(0x0) socket$l2tp(0x18, 0x1, 0x1) 19:32:39 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) 19:32:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050095}]}) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000140)={{0x2, 0x0, @rand_addr}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x0, {0x2}, 'teql0\x00'}) 19:32:39 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000140), &(0x7f00000001c0)=0x14) 19:32:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000180)) 19:32:39 executing program 6: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 19:32:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000280)) 19:32:39 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 19:32:39 executing program 1: gettid() socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) 19:32:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) socket$l2tp(0x18, 0x1, 0x1) 19:32:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 19:32:39 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000140), &(0x7f00000001c0)=0x14) [ 774.750872] audit: type=1326 audit(1529695959.749:1653): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16319 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:32:39 executing program 2: socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000140)={{0x2, 0x0, @rand_addr}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x0, {0x2}, 'teql0\x00'}) 19:32:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000280)) 19:32:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000180)) 19:32:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 19:32:40 executing program 1: gettid() socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) 19:32:40 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000140), &(0x7f00000001c0)=0x14) 19:32:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) socket$l2tp(0x18, 0x1, 0x1) 19:32:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000280)) 19:32:40 executing program 0: ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000280)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000180)) 19:32:40 executing program 2: socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000140)={{0x2, 0x0, @rand_addr}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x0, {0x2}, 'teql0\x00'}) 19:32:40 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000140), &(0x7f00000001c0)=0x14) 19:32:40 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 19:32:40 executing program 1: gettid() socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) 19:32:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 19:32:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000280)) 19:32:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) socket$l2tp(0x18, 0x1, 0x1) 19:32:40 executing program 0: ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000280)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000180)) 19:32:40 executing program 2: socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000140)={{0x2, 0x0, @rand_addr}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x0, {0x2}, 'teql0\x00'}) 19:32:40 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023e}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000140), &(0x7f00000001c0)=0x14) [ 775.680142] audit: type=1326 audit(1529695960.678:1654): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16385 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 775.739770] audit: type=1326 audit(1529695960.731:1655): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16393 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:32:40 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023e}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000140), &(0x7f00000001c0)=0x14) 19:32:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 19:32:40 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) gettid() socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) 19:32:40 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050095}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000140)={{0x2, 0x0, @rand_addr}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x0, {0x2}, 'teql0\x00'}) 19:32:40 executing program 0: ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000280)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000180)) 19:32:40 executing program 7: eventfd(0x0) socket$l2tp(0x18, 0x1, 0x1) 19:32:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 19:32:41 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023e}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000140), &(0x7f00000001c0)=0x14) 19:32:41 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 19:32:41 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) gettid() socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) 19:32:41 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000280)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000180)) 19:32:41 executing program 7: eventfd(0x0) socket$l2tp(0x18, 0x1, 0x1) 19:32:41 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050095}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000140)={{0x2, 0x0, @rand_addr}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x0, {0x2}, 'teql0\x00'}) 19:32:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 19:32:41 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000140), &(0x7f00000001c0)=0x14) 19:32:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000280)) [ 776.662495] audit: type=1326 audit(1529695961.661:1656): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16431 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:32:41 executing program 7: eventfd(0x0) socket$l2tp(0x18, 0x1, 0x1) 19:32:41 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000280)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000180)) [ 776.747001] audit: type=1326 audit(1529695961.699:1657): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16434 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 776.767038] audit: type=1326 audit(1529695961.717:1658): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16433 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:32:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 19:32:41 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) gettid() socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) 19:32:41 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050095}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000140)={{0x2, 0x0, @rand_addr}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x0, {0x2}, 'teql0\x00'}) 19:32:41 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) eventfd(0x0) socket$l2tp(0x18, 0x1, 0x1) 19:32:42 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000280)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000180)) [ 776.967187] audit: type=1326 audit(1529695961.946:1659): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16459 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:32:42 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) gettid() socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) 19:32:42 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000280)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000180)) 19:32:42 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) eventfd(0x0) socket$l2tp(0x18, 0x1, 0x1) 19:32:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000140)={{0x2, 0x0, @rand_addr}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x0, {0x2}, 'teql0\x00'}) 19:32:42 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) gettid() socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) 19:32:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000280)) 19:32:42 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000140), &(0x7f00000001c0)=0x14) 19:32:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x2000050096}]}) request_key(&(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)={0x73, 0x79, 0x7a}, &(0x7f00000005c0)='-eth1.cgroupeth0\x00', 0xfffffffffffffff8) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000980), 0x4) [ 777.665195] audit: type=1326 audit(1529695962.663:1660): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16487 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:32:42 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000280)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000180)) 19:32:42 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) eventfd(0x0) socket$l2tp(0x18, 0x1, 0x1) 19:32:42 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) gettid() socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) [ 777.740643] audit: type=1326 audit(1529695962.695:1661): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16485 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:32:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 19:32:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000140)={{0x2, 0x0, @rand_addr}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x0, {0x2}, 'teql0\x00'}) 19:32:42 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000280)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000180)) 19:32:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x2000050096}]}) request_key(&(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)={0x73, 0x79, 0x7a}, &(0x7f00000005c0)='-eth1.cgroupeth0\x00', 0xfffffffffffffff8) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000980), 0x4) 19:32:42 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) eventfd(0x0) socket$l2tp(0x18, 0x1, 0x1) 19:32:43 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) gettid() socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) [ 777.968520] audit: type=1326 audit(1529695962.967:1662): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16518 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:32:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) eventfd(0x0) socket$l2tp(0x18, 0x1, 0x1) 19:32:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020e}]}) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000280)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000180)) 19:32:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000140)={{0x2, 0x0, @rand_addr}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x0, {0x2}, 'teql0\x00'}) 19:32:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x2000050096}]}) request_key(&(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)={0x73, 0x79, 0x7a}, &(0x7f00000005c0)='-eth1.cgroupeth0\x00', 0xfffffffffffffff8) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000980), 0x4) 19:32:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) eventfd(0x0) socket$l2tp(0x18, 0x1, 0x1) 19:32:43 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) gettid() socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) 19:32:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020e}]}) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000280)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000180)) 19:32:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050095}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000140)={{0x2, 0x0, @rand_addr}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x0, {0x2}, 'teql0\x00'}) 19:32:43 executing program 5: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002640)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002440)) 19:32:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x2000050096}]}) request_key(&(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)={0x73, 0x79, 0x7a}, &(0x7f00000005c0)='-eth1.cgroupeth0\x00', 0xfffffffffffffff8) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000980), 0x4) 19:32:43 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 19:32:43 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000140), &(0x7f00000001c0)=0x14) 19:32:43 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) gettid() socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) 19:32:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fe}]}) eventfd(0x0) socket$l2tp(0x18, 0x1, 0x1) 19:32:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020e}]}) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000280)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000180)) 19:32:43 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000005580)) 19:32:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050095}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000140)={{0x2, 0x0, @rand_addr}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x0, {0x2}, 'teql0\x00'}) 19:32:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x2000050096}]}) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000980), 0x4) [ 778.906738] audit: type=1326 audit(1529695963.904:1663): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16577 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:32:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000280)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000180)) [ 778.972966] audit: type=1326 audit(1529695963.946:1664): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16593 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:32:44 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) gettid() socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) 19:32:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fe}]}) eventfd(0x0) socket$l2tp(0x18, 0x1, 0x1) 19:32:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x2000050096}]}) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000980), 0x4) 19:32:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050095}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000140)={{0x2, 0x0, @rand_addr}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x0, {0x2}, 'teql0\x00'}) [ 779.102712] audit: type=1326 audit(1529695964.097:1665): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16598 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:32:44 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000005580)) [ 779.149189] audit: type=1326 audit(1529695964.125:1666): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16600 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:32:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fe}]}) eventfd(0x0) socket$l2tp(0x18, 0x1, 0x1) 19:32:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x2000050096}]}) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000980), 0x4) 19:32:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) eventfd(0x0) socket$l2tp(0x18, 0x1, 0x1) 19:32:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000140)={{0x2, 0x0, @rand_addr}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x0, {0x2}, 'teql0\x00'}) 19:32:44 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000005580)) 19:32:44 executing program 4: request_key(&(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)={0x73, 0x79, 0x7a}, &(0x7f00000005c0)='-eth1.cgroupeth0\x00', 0xfffffffffffffff8) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000980), 0x4) 19:32:44 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) stat(&(0x7f0000000780)='./file0\x00', &(0x7f0000000040)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000cc0)=0x14) 19:32:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) timer_create(0x0, &(0x7f0000000100), &(0x7f0000000140)) timer_getoverrun(0x0) [ 779.873743] audit: type=1326 audit(1529695964.872:1667): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16630 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 779.935418] audit: type=1326 audit(1529695964.898:1668): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16631 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:32:44 executing program 4: request_key(&(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)={0x73, 0x79, 0x7a}, &(0x7f00000005c0)='-eth1.cgroupeth0\x00', 0xfffffffffffffff8) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000980), 0x4) 19:32:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000280)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000180)) 19:32:45 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) gettid() socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) 19:32:45 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000005580)) 19:32:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) timer_create(0x0, &(0x7f0000000100), &(0x7f0000000140)) timer_getoverrun(0x0) 19:32:45 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) stat(&(0x7f0000000780)='./file0\x00', &(0x7f0000000040)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000cc0)=0x14) 19:32:45 executing program 4: request_key(&(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)={0x73, 0x79, 0x7a}, &(0x7f00000005c0)='-eth1.cgroupeth0\x00', 0xfffffffffffffff8) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000980), 0x4) [ 780.142942] audit: type=1326 audit(1529695965.141:1670): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16652 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:32:45 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x2000050096}]}) request_key(&(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)={0x73, 0x79, 0x7a}, &(0x7f00000005c0)='-eth1.cgroupeth0\x00', 0xfffffffffffffff8) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000980), 0x4) 19:32:45 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x2000050096}]}) request_key(&(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)={0x73, 0x79, 0x7a}, &(0x7f00000005c0)='-eth1.cgroupeth0\x00', 0xfffffffffffffff8) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000980), 0x4) 19:32:45 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) stat(&(0x7f0000000780)='./file0\x00', &(0x7f0000000040)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000cc0)=0x14) 19:32:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) eventfd(0x0) socket$l2tp(0x18, 0x1, 0x1) 19:32:45 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000140)={{0x2, 0x0, @rand_addr}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x0, {0x2}, 'teql0\x00'}) 19:32:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) timer_create(0x0, &(0x7f0000000100), &(0x7f0000000140)) timer_getoverrun(0x0) 19:32:45 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000005580)) 19:32:45 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x2000050096}]}) request_key(&(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)={0x73, 0x79, 0x7a}, &(0x7f00000005c0)='-eth1.cgroupeth0\x00', 0xfffffffffffffff8) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000980), 0x4) 19:32:45 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) stat(&(0x7f0000000780)='./file0\x00', &(0x7f0000000040)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000cc0)=0x14) 19:32:45 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000005580)) 19:32:46 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000280)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000180)) 19:32:46 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) gettid() socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) 19:32:46 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000cc0)=0x14) 19:32:46 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) request_key(&(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)={0x73, 0x79, 0x7a}, &(0x7f00000005c0)='-eth1.cgroupeth0\x00', 0xfffffffffffffff8) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000980), 0x4) 19:32:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) timer_create(0x0, &(0x7f0000000100), &(0x7f0000000140)) timer_getoverrun(0x0) 19:32:46 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000005580)) 19:32:46 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) request_key(&(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)={0x73, 0x79, 0x7a}, &(0x7f00000005c0)='-eth1.cgroupeth0\x00', 0xfffffffffffffff8) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000980), 0x4) 19:32:46 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000cc0)=0x14) 19:32:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) timer_getoverrun(0x0) 19:32:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) eventfd(0x0) socket$l2tp(0x18, 0x1, 0x1) 19:32:46 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000140)={{0x2, 0x0, @rand_addr}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x0, {0x2}, 'teql0\x00'}) 19:32:46 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000005580)) 19:32:46 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) request_key(&(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)={0x73, 0x79, 0x7a}, &(0x7f00000005c0)='-eth1.cgroupeth0\x00', 0xfffffffffffffff8) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000980), 0x4) 19:32:46 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000cc0)=0x14) 19:32:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) timer_getoverrun(0x0) 19:32:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) timer_getoverrun(0x0) 19:32:47 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x2000050096}]}) request_key(&(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)={0x73, 0x79, 0x7a}, &(0x7f00000005c0)='-eth1.cgroupeth0\x00', 0xfffffffffffffff8) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000980), 0x4) 19:32:47 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x2000050096}]}) request_key(&(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)={0x73, 0x79, 0x7a}, &(0x7f00000005c0)='-eth1.cgroupeth0\x00', 0xfffffffffffffff8) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000980), 0x4) 19:32:47 executing program 3: stat(&(0x7f0000000780)='./file0\x00', &(0x7f0000000040)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000cc0)=0x14) 19:32:47 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000005580)) 19:32:47 executing program 6: timer_create(0x0, &(0x7f0000000100), &(0x7f0000000140)) timer_getoverrun(0x0) 19:32:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x2000050096}]}) request_key(&(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)={0x73, 0x79, 0x7a}, &(0x7f00000005c0)='-eth1.cgroupeth0\x00', 0xfffffffffffffff8) socket$inet_udp(0x2, 0x2, 0x0) 19:32:47 executing program 1: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) sched_getscheduler(0x0) 19:32:47 executing program 3: stat(&(0x7f0000000780)='./file0\x00', &(0x7f0000000040)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000cc0)=0x14) 19:32:47 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000005580)) 19:32:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x2000050096}]}) request_key(&(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)={0x73, 0x79, 0x7a}, &(0x7f00000005c0)='-eth1.cgroupeth0\x00', 0xfffffffffffffff8) socket$inet_udp(0x2, 0x2, 0x0) 19:32:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x2000050096}]}) request_key(&(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)={0x73, 0x79, 0x7a}, &(0x7f00000005c0)='-eth1.cgroupeth0\x00', 0xfffffffffffffff8) socket$inet_udp(0x2, 0x2, 0x0) 19:32:47 executing program 6: timer_create(0x0, &(0x7f0000000100), &(0x7f0000000140)) timer_getoverrun(0x0) 19:32:47 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x2000050096}]}) request_key(&(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)={0x73, 0x79, 0x7a}, &(0x7f00000005c0)='-eth1.cgroupeth0\x00', 0xfffffffffffffff8) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000980), 0x4) 19:32:47 executing program 1: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) sched_getscheduler(0x0) 19:32:47 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000005580)) 19:32:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) eventfd(0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000000)={@mcast1={0xff, 0x1, [], 0x1}}, &(0x7f0000000040)=0x20) 19:32:47 executing program 3: stat(&(0x7f0000000780)='./file0\x00', &(0x7f0000000040)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000cc0)=0x14) 19:32:47 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) 19:32:47 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) request_key(&(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)={0x73, 0x79, 0x7a}, &(0x7f00000005c0)='-eth1.cgroupeth0\x00', 0xfffffffffffffff8) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000980), 0x4) 19:32:47 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000005580)) 19:32:47 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) stat(&(0x7f0000000780)='./file0\x00', &(0x7f0000000040)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000cc0)=0x14) 19:32:47 executing program 6: timer_create(0x0, &(0x7f0000000100), &(0x7f0000000140)) timer_getoverrun(0x0) 19:32:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x2000050096}]}) request_key(&(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)={0x73, 0x79, 0x7a}, &(0x7f00000005c0)='-eth1.cgroupeth0\x00', 0xfffffffffffffff8) socket$inet_udp(0x2, 0x2, 0x0) 19:32:48 executing program 1: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) sched_getscheduler(0x0) [ 783.003662] kauditd_printk_skb: 7 callbacks suppressed [ 783.003685] audit: type=1326 audit(1529695968.002:1677): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16819 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:32:48 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) 19:32:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) epoll_create(0x0) 19:32:48 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000005580)) 19:32:48 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) timer_create(0x0, &(0x7f0000000100), &(0x7f0000000140)) timer_getoverrun(0x0) 19:32:48 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) stat(&(0x7f0000000780)='./file0\x00', &(0x7f0000000040)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000cc0)=0x14) 19:32:48 executing program 1: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) sched_getscheduler(0x0) 19:32:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socket$inet_udp(0x2, 0x2, 0x0) 19:32:48 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000005580)) 19:32:48 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) timer_create(0x0, &(0x7f0000000100), &(0x7f0000000140)) timer_getoverrun(0x0) 19:32:48 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) 19:32:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socket$inet_udp(0x2, 0x2, 0x0) 19:32:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) request_key(&(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)={0x73, 0x79, 0x7a}, &(0x7f00000005c0)='-eth1.cgroupeth0\x00', 0xfffffffffffffff8) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000980), 0x4) 19:32:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) epoll_create(0x0) 19:32:48 executing program 1: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) sched_getscheduler(0x0) 19:32:48 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) stat(&(0x7f0000000780)='./file0\x00', &(0x7f0000000040)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000cc0)=0x14) 19:32:48 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000005580)) 19:32:48 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) timer_create(0x0, &(0x7f0000000100), &(0x7f0000000140)) timer_getoverrun(0x0) 19:32:48 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) 19:32:49 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000005580)) [ 784.000537] audit: type=1326 audit(1529695968.998:1678): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16884 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:32:49 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) stat(&(0x7f0000000780)='./file0\x00', &(0x7f0000000040)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000cc0)=0x14) 19:32:49 executing program 1: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) sched_getscheduler(0x0) 19:32:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) timer_create(0x0, &(0x7f0000000100), &(0x7f0000000140)) timer_getoverrun(0x0) 19:32:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50241}]}) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) 19:32:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socket$inet_udp(0x2, 0x2, 0x0) 19:32:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) epoll_create(0x0) 19:32:49 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023e}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000005580)) 19:32:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) timer_create(0x0, &(0x7f0000000100), &(0x7f0000000140)) timer_getoverrun(0x0) 19:32:49 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) request_key(&(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)={0x73, 0x79, 0x7a}, &(0x7f00000005c0)='-eth1.cgroupeth0\x00', 0xfffffffffffffff8) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000980), 0x4) 19:32:49 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) stat(&(0x7f0000000780)='./file0\x00', &(0x7f0000000040)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000cc0)=0x14) 19:32:49 executing program 1: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) sched_getscheduler(0x0) 19:32:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50241}]}) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) 19:32:49 executing program 0: request_key(&(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)={0x73, 0x79, 0x7a}, &(0x7f00000005c0)='-eth1.cgroupeth0\x00', 0xfffffffffffffff8) socket$inet_udp(0x2, 0x2, 0x0) 19:32:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) timer_create(0x0, &(0x7f0000000100), &(0x7f0000000140)) timer_getoverrun(0x0) 19:32:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) epoll_create(0x0) 19:32:49 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023e}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000005580)) 19:32:50 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fe}]}) timer_create(0x0, &(0x7f0000000100), &(0x7f0000000140)) timer_getoverrun(0x0) [ 784.973769] audit: type=1326 audit(1529695969.971:1679): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16925 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:32:50 executing program 0: request_key(&(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)={0x73, 0x79, 0x7a}, &(0x7f00000005c0)='-eth1.cgroupeth0\x00', 0xfffffffffffffff8) socket$inet_udp(0x2, 0x2, 0x0) 19:32:50 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) stat(&(0x7f0000000780)='./file0\x00', &(0x7f0000000040)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000cc0)=0x14) 19:32:50 executing program 1: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) sched_getscheduler(0x0) 19:32:50 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023e}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000005580)) 19:32:50 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50241}]}) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) 19:32:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) epoll_create(0x0) 19:32:50 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fe}]}) timer_create(0x0, &(0x7f0000000100), &(0x7f0000000140)) timer_getoverrun(0x0) 19:32:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) epoll_create(0x0) 19:32:50 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000005580)) 19:32:50 executing program 1: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) sched_getscheduler(0x0) 19:32:50 executing program 7: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) 19:32:50 executing program 0: request_key(&(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)={0x73, 0x79, 0x7a}, &(0x7f00000005c0)='-eth1.cgroupeth0\x00', 0xfffffffffffffff8) socket$inet_udp(0x2, 0x2, 0x0) 19:32:50 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fe}]}) timer_create(0x0, &(0x7f0000000100), &(0x7f0000000140)) timer_getoverrun(0x0) 19:32:50 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) stat(&(0x7f0000000780)='./file0\x00', &(0x7f0000000040)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000cc0)=0x14) 19:32:50 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) timer_create(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, @thr={&(0x7f0000000280), &(0x7f0000000300)}}, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0), 0x1) [ 785.894963] audit: type=1326 audit(1529695970.893:1680): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16976 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:32:50 executing program 7: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) 19:32:51 executing program 1: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) sched_getscheduler(0x0) 19:32:51 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) stat(&(0x7f0000000780)='./file0\x00', &(0x7f0000000040)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000cc0)=0x14) 19:32:51 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x2000050096}]}) request_key(&(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)={0x73, 0x79, 0x7a}, &(0x7f00000005c0)='-eth1.cgroupeth0\x00', 0xfffffffffffffff8) socket$inet_udp(0x2, 0x2, 0x0) 19:32:51 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) timer_create(0x0, &(0x7f0000000100), &(0x7f0000000140)) timer_getoverrun(0x0) 19:32:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) epoll_create(0x0) [ 786.142200] audit: type=1326 audit(1529695971.140:1681): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16996 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:32:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) timer_create(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, @thr={&(0x7f0000000280), &(0x7f0000000300)}}, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0), 0x1) 19:32:51 executing program 7: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) 19:32:51 executing program 1: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) sched_getscheduler(0x0) 19:32:51 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000005580)) 19:32:51 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x2000050096}]}) request_key(&(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)={0x73, 0x79, 0x7a}, &(0x7f00000005c0)='-eth1.cgroupeth0\x00', 0xfffffffffffffff8) socket$inet_udp(0x2, 0x2, 0x0) 19:32:51 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) stat(&(0x7f0000000780)='./file0\x00', &(0x7f0000000040)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000cc0)=0x14) 19:32:51 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) epoll_create(0x0) 19:32:51 executing program 7: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) 19:32:51 executing program 1: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) sched_getscheduler(0x0) 19:32:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) timer_create(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, @thr={&(0x7f0000000280), &(0x7f0000000300)}}, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0), 0x1) [ 786.887306] audit: type=1326 audit(1529695971.885:1682): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17035 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:32:51 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) epoll_create(0x0) 19:32:51 executing program 1: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) sched_getscheduler(0x0) 19:32:51 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x2000050096}]}) request_key(&(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)={0x73, 0x79, 0x7a}, &(0x7f00000005c0)='-eth1.cgroupeth0\x00', 0xfffffffffffffff8) socket$inet_udp(0x2, 0x2, 0x0) 19:32:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) timer_create(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, @thr={&(0x7f0000000280), &(0x7f0000000300)}}, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0), 0x1) 19:32:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) timer_create(0x0, &(0x7f0000000100), &(0x7f0000000140)) timer_getoverrun(0x0) 19:32:52 executing program 7: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) 19:32:52 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) stat(&(0x7f0000000780)='./file0\x00', &(0x7f0000000040)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000cc0)=0x14) [ 787.119945] audit: type=1326 audit(1529695972.118:1683): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17052 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:32:52 executing program 1: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f00000006c0)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) sched_getscheduler(0x0) 19:32:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) request_key(&(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)={0x73, 0x79, 0x7a}, &(0x7f00000005c0)='-eth1.cgroupeth0\x00', 0xfffffffffffffff8) socket$inet_udp(0x2, 0x2, 0x0) [ 787.186007] audit: type=1326 audit(1529695972.175:1684): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17056 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:32:52 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000005580)) 19:32:52 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) epoll_create(0x0) 19:32:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0), 0x1) 19:32:52 executing program 7: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) 19:32:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) request_key(&(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)={0x73, 0x79, 0x7a}, &(0x7f00000005c0)='-eth1.cgroupeth0\x00', 0xfffffffffffffff8) socket$inet_udp(0x2, 0x2, 0x0) 19:32:52 executing program 1: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f00000006c0)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) sched_getscheduler(0x0) 19:32:52 executing program 1: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f00000006c0)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) sched_getscheduler(0x0) [ 787.856989] audit: type=1326 audit(1529695972.855:1685): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17082 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:32:52 executing program 2: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) epoll_create(0x0) 19:32:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) request_key(&(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)={0x73, 0x79, 0x7a}, &(0x7f00000005c0)='-eth1.cgroupeth0\x00', 0xfffffffffffffff8) socket$inet_udp(0x2, 0x2, 0x0) 19:32:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) 19:32:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0), 0x1) 19:32:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) timer_create(0x0, &(0x7f0000000100), &(0x7f0000000140)) timer_getoverrun(0x0) 19:32:53 executing program 2: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) epoll_create(0x0) 19:32:53 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) stat(&(0x7f0000000780)='./file0\x00', &(0x7f0000000040)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000cc0)=0x14) 19:32:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) 19:32:53 executing program 1: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) sched_getscheduler(0x0) [ 788.236342] audit: type=1326 audit(1529695973.235:1686): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17107 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 788.331356] audit: type=1326 audit(1529695973.322:1687): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17111 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:32:53 executing program 1: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) sched_getscheduler(0x0) 19:32:53 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0), 0x1) 19:32:53 executing program 2: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) epoll_create(0x0) 19:32:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) 19:32:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x2000050096}]}) request_key(&(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)={0x73, 0x79, 0x7a}, &(0x7f00000005c0)='-eth1.cgroupeth0\x00', 0xfffffffffffffff8) socket$inet_udp(0x2, 0x2, 0x0) 19:32:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50241}]}) socket(0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) 19:32:53 executing program 1: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) sched_getscheduler(0x0) 19:32:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) 19:32:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) epoll_create(0x0) 19:32:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x2000050096}]}) request_key(&(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)={0x73, 0x79, 0x7a}, &(0x7f00000005c0)='-eth1.cgroupeth0\x00', 0xfffffffffffffff8) socket$inet_udp(0x2, 0x2, 0x0) 19:32:54 executing program 4: timer_create(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, @thr={&(0x7f0000000280), &(0x7f0000000300)}}, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0), 0x1) 19:32:54 executing program 1: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) sched_getscheduler(0x0) 19:32:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50241}]}) socket(0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) 19:32:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) 19:32:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) epoll_create(0x0) 19:32:54 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) stat(&(0x7f0000000780)='./file0\x00', &(0x7f0000000040)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000cc0)=0x14) 19:32:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x2000050096}]}) request_key(&(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)={0x73, 0x79, 0x7a}, &(0x7f00000005c0)='-eth1.cgroupeth0\x00', 0xfffffffffffffff8) socket$inet_udp(0x2, 0x2, 0x0) 19:32:54 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) request_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='hugetlb.2MB.usage_in_bytes\x00', 0x0) 19:32:54 executing program 4: timer_create(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, @thr={&(0x7f0000000280), &(0x7f0000000300)}}, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0), 0x1) [ 789.303970] audit: type=1326 audit(1529695974.302:1688): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17165 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:32:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) epoll_create(0x0) [ 789.401813] audit: type=1326 audit(1529695974.383:1689): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17171 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:32:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50241}]}) socket(0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) 19:32:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) 19:32:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) request_key(&(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)={0x73, 0x79, 0x7a}, &(0x7f00000005c0)='-eth1.cgroupeth0\x00', 0xfffffffffffffff8) socket$inet_udp(0x2, 0x2, 0x0) 19:32:54 executing program 4: timer_create(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, @thr={&(0x7f0000000280), &(0x7f0000000300)}}, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0), 0x1) 19:32:54 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) request_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='hugetlb.2MB.usage_in_bytes\x00', 0x0) [ 789.646789] audit: type=1326 audit(1529695974.645:1690): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17190 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:32:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) 19:32:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50241}]}) socket(0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) [ 789.788899] audit: type=1326 audit(1529695974.787:1691): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17197 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:32:55 executing program 1: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) sched_getscheduler(0x0) 19:32:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) epoll_create(0x0) 19:32:55 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) timer_create(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, @thr={&(0x7f0000000280), &(0x7f0000000300)}}, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0), 0x1) 19:32:55 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) 19:32:55 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) request_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='hugetlb.2MB.usage_in_bytes\x00', 0x0) 19:32:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) bind$pptp(0xffffffffffffffff, &(0x7f0000000180)={0x18, 0x2}, 0x1e) 19:32:55 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) timer_create(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, @thr={&(0x7f0000000280), &(0x7f0000000300)}}, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0), 0x1) [ 790.335365] audit: type=1326 audit(1529695975.333:1692): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17220 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:32:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) epoll_create(0x0) 19:32:55 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) 19:32:55 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) request_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='hugetlb.2MB.usage_in_bytes\x00', 0x0) 19:32:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) bind$pptp(0xffffffffffffffff, &(0x7f0000000180)={0x18, 0x2}, 0x1e) 19:32:55 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) request_key(&(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)={0x73, 0x79, 0x7a}, &(0x7f00000005c0)='-eth1.cgroupeth0\x00', 0xfffffffffffffff8) socket$inet_udp(0x2, 0x2, 0x0) 19:32:55 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) timer_create(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, @thr={&(0x7f0000000280), &(0x7f0000000300)}}, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0), 0x1) 19:32:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) epoll_create(0x0) [ 790.671952] audit: type=1326 audit(1529695975.670:1693): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17245 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:32:55 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) 19:32:55 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) [ 790.840201] audit: type=1326 audit(1529695975.838:1694): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17256 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:32:56 executing program 1: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) sched_getscheduler(0x0) 19:32:56 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) request_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='hugetlb.2MB.usage_in_bytes\x00', 0x0) 19:32:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) timer_create(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, @thr={&(0x7f0000000280), &(0x7f0000000300)}}, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0), 0x1) 19:32:56 executing program 5: socket(0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) 19:32:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) bind$pptp(0xffffffffffffffff, &(0x7f0000000180)={0x18, 0x2}, 0x1e) 19:32:56 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) epoll_create(0x0) 19:32:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) timer_create(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, @thr={&(0x7f0000000280), &(0x7f0000000300)}}, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0), 0x1) [ 791.285542] audit: type=1326 audit(1529695976.284:1695): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17262 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:32:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) bind$pptp(0xffffffffffffffff, &(0x7f0000000180)={0x18, 0x2}, 0x1e) 19:32:56 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) request_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='hugetlb.2MB.usage_in_bytes\x00', 0x0) 19:32:56 executing program 5: socket(0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) 19:32:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) timer_create(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, @thr={&(0x7f0000000280), &(0x7f0000000300)}}, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0), 0x1) 19:32:56 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) request_key(&(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)={0x73, 0x79, 0x7a}, &(0x7f00000005c0)='-eth1.cgroupeth0\x00', 0xfffffffffffffff8) socket$inet_udp(0x2, 0x2, 0x0) 19:32:56 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) request_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='hugetlb.2MB.usage_in_bytes\x00', 0x0) 19:32:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000050092}]}) bind$pptp(0xffffffffffffffff, &(0x7f0000000180)={0x18, 0x2}, 0x1e) 19:32:56 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) 19:32:56 executing program 5: socket(0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) 19:32:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) epoll_create(0x0) 19:32:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050092}]}) timer_create(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, @thr={&(0x7f0000000280), &(0x7f0000000300)}}, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0), 0x1) 19:32:57 executing program 6: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) request_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='hugetlb.2MB.usage_in_bytes\x00', 0x0) 19:32:57 executing program 5: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50241}]}) socket(0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) 19:32:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000050092}]}) bind$pptp(0xffffffffffffffff, &(0x7f0000000180)={0x18, 0x2}, 0x1e) 19:32:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000fff000/0x1000)=nil, 0x1000}}) 19:32:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000050092}]}) bind$pptp(0xffffffffffffffff, &(0x7f0000000180)={0x18, 0x2}, 0x1e) 19:32:57 executing program 6: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) request_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='hugetlb.2MB.usage_in_bytes\x00', 0x0) 19:32:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050092}]}) timer_create(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, @thr={&(0x7f0000000280), &(0x7f0000000300)}}, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0), 0x1) 19:32:57 executing program 5: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50241}]}) socket(0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) 19:32:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000fff000/0x1000)=nil, 0x1000}}) 19:32:57 executing program 3: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) bind$pptp(0xffffffffffffffff, &(0x7f0000000180)={0x18, 0x2}, 0x1e) 19:32:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050092}]}) timer_create(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, @thr={&(0x7f0000000280), &(0x7f0000000300)}}, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0), 0x1) 19:32:57 executing program 6: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) request_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='hugetlb.2MB.usage_in_bytes\x00', 0x0) 19:32:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000fff000/0x1000)=nil, 0x1000}}) 19:32:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)) 19:32:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) epoll_create(0x0) 19:32:58 executing program 5: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50241}]}) socket(0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) 19:32:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=""/8}, 0x18) 19:32:58 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) timer_create(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, @thr={&(0x7f0000000280), &(0x7f0000000300)}}, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0), 0x1) 19:32:58 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) request_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='hugetlb.2MB.usage_in_bytes\x00', 0x0) 19:32:58 executing program 3: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) bind$pptp(0xffffffffffffffff, &(0x7f0000000180)={0x18, 0x2}, 0x1e) 19:32:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000fff000/0x1000)=nil, 0x1000}}) 19:32:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)) 19:32:58 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) request_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='hugetlb.2MB.usage_in_bytes\x00', 0x0) [ 793.244795] kauditd_printk_skb: 5 callbacks suppressed [ 793.244817] audit: type=1326 audit(1529695978.243:1701): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17384 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:32:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f0000000040)}) socket(0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) 19:32:58 executing program 3: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) bind$pptp(0xffffffffffffffff, &(0x7f0000000180)={0x18, 0x2}, 0x1e) 19:32:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)) 19:32:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000fff000/0x1000)=nil, 0x1000}}) 19:32:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=""/8}, 0x18) 19:32:58 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) request_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='hugetlb.2MB.usage_in_bytes\x00', 0x0) 19:32:58 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) bind$pptp(0xffffffffffffffff, &(0x7f0000000180)={0x18, 0x2}, 0x1e) 19:32:59 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) timer_create(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, @thr={&(0x7f0000000280), &(0x7f0000000300)}}, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0), 0x1) 19:32:59 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f0000000040)}) socket(0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) 19:32:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)) 19:32:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000fff000/0x1000)=nil, 0x1000}}) 19:32:59 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000040)) 19:32:59 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) bind$pptp(0xffffffffffffffff, &(0x7f0000000180)={0x18, 0x2}, 0x1e) 19:32:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=""/8}, 0x18) 19:32:59 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) request_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='hugetlb.2MB.usage_in_bytes\x00', 0x0) [ 794.189730] audit: type=1326 audit(1529695979.188:1702): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17428 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:32:59 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) request_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='hugetlb.2MB.usage_in_bytes\x00', 0x0) 19:32:59 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f0000000040)}) socket(0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) 19:32:59 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) bind$pptp(0xffffffffffffffff, &(0x7f0000000180)={0x18, 0x2}, 0x1e) 19:32:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)) 19:32:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=""/8}, 0x18) 19:32:59 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000040)) 19:32:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000fff000/0x1000)=nil, 0x1000}}) 19:32:59 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) request_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='hugetlb.2MB.usage_in_bytes\x00', 0x0) 19:33:00 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) timer_create(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, @thr={&(0x7f0000000280), &(0x7f0000000300)}}, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0), 0x1) 19:33:00 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50241}]}) socket(0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) 19:33:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) bind$pptp(0xffffffffffffffff, &(0x7f0000000180)={0x18, 0x2}, 0x1e) 19:33:00 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)) 19:33:00 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000040)) 19:33:00 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) request_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='hugetlb.2MB.usage_in_bytes\x00', 0x0) 19:33:00 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000fff000/0x1000)=nil, 0x1000}}) 19:33:00 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=""/8}, 0x18) [ 795.163190] audit: type=1326 audit(1529695980.161:1703): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17490 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:00 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) request_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='hugetlb.2MB.usage_in_bytes\x00', 0x0) 19:33:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) bind$pptp(0xffffffffffffffff, &(0x7f0000000180)={0x18, 0x2}, 0x1e) 19:33:00 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=""/8}, 0x18) 19:33:00 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000fff000/0x1000)=nil, 0x1000}}) 19:33:00 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50241}]}) socket(0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) 19:33:00 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000040)) 19:33:00 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)) 19:33:00 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) request_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='hugetlb.2MB.usage_in_bytes\x00', 0x0) 19:33:01 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=""/8}, 0x18) 19:33:01 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000fff000/0x1000)=nil, 0x1000}}) 19:33:01 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000040)) 19:33:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50241}]}) socket(0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) 19:33:01 executing program 0: socket$inet(0x2, 0x0, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)) 19:33:01 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) request_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='hugetlb.2MB.usage_in_bytes\x00', 0x0) 19:33:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) bind$pptp(0xffffffffffffffff, &(0x7f0000000180)={0x18, 0x2}, 0x1e) 19:33:01 executing program 4: [ 796.119802] audit: type=1326 audit(1529695981.118:1704): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17530 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) bind$pptp(0xffffffffffffffff, &(0x7f0000000180)={0x18, 0x2}, 0x1e) 19:33:01 executing program 1: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000fff000/0x1000)=nil, 0x1000}}) 19:33:01 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000040)) 19:33:01 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=""/8}, 0x18) 19:33:01 executing program 4: 19:33:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f0000000040)=[{0x6}]}) socket(0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) 19:33:01 executing program 0: socket$inet(0x2, 0x0, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)) 19:33:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) bind$pptp(0xffffffffffffffff, &(0x7f0000000180)={0x18, 0x2}, 0x1e) [ 796.419317] audit: type=1326 audit(1529695981.417:1705): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17558 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:01 executing program 4: 19:33:01 executing program 1: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000fff000/0x1000)=nil, 0x1000}}) 19:33:01 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000040)) 19:33:01 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=""/8}, 0x18) 19:33:02 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) request_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='hugetlb.2MB.usage_in_bytes\x00', 0x0) 19:33:02 executing program 4: 19:33:02 executing program 0: socket$inet(0x2, 0x0, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)) 19:33:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) bind$pptp(0xffffffffffffffff, &(0x7f0000000180)={0x18, 0x2}, 0x1e) 19:33:02 executing program 1: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000fff000/0x1000)=nil, 0x1000}}) 19:33:02 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=""/8}, 0x18) 19:33:02 executing program 2: dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000040)) [ 797.035469] audit: type=1326 audit(1529695982.034:1706): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17589 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:02 executing program 4: 19:33:02 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=""/8}, 0x18) 19:33:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f0000000040)=[{0x6}]}) socket(0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) 19:33:02 executing program 2: dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000040)) 19:33:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) bind$pptp(0xffffffffffffffff, &(0x7f0000000180)={0x18, 0x2}, 0x1e) 19:33:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000fff000/0x1000)=nil, 0x1000}}) 19:33:02 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)) 19:33:02 executing program 4: 19:33:02 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=""/8}, 0x18) [ 797.378972] audit: type=1326 audit(1529695982.377:1707): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17617 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 797.451675] audit: type=1326 audit(1529695982.440:1708): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17630 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:02 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) request_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='hugetlb.2MB.usage_in_bytes\x00', 0x0) 19:33:02 executing program 4: 19:33:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000fff000/0x1000)=nil, 0x1000}}) 19:33:02 executing program 2: dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000040)) 19:33:02 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=""/8}, 0x18) 19:33:02 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)) 19:33:03 executing program 4: [ 798.016473] audit: type=1326 audit(1529695983.015:1709): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17650 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:03 executing program 2: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000040)) 19:33:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=""/8}, 0x18) 19:33:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000280)) 19:33:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=""/8}, 0x18) 19:33:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000fff000/0x1000)=nil, 0x1000}}) 19:33:03 executing program 2: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000040)) 19:33:03 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)) 19:33:03 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f0000000040)=[{0x6}]}) socket(0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) 19:33:03 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) bind$pptp(0xffffffffffffffff, &(0x7f0000000180)={0x18, 0x2}, 0x1e) [ 798.391825] audit: type=1326 audit(1529695983.390:1710): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17671 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 798.479769] audit: type=1326 audit(1529695983.438:1711): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17680 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) inotify_init() socket$alg(0x26, 0x5, 0x0) 19:33:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=""/8}, 0x18) 19:33:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000fff000/0x1000)=nil, 0x1000}}) 19:33:03 executing program 2: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000040)) 19:33:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)) 19:33:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0), 0x0) 19:33:04 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000fff000/0x1000)=nil, 0x1000}}) 19:33:04 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000040)) 19:33:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050092}]}) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=""/8}, 0x18) 19:33:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)) 19:33:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) bind$pptp(0xffffffffffffffff, &(0x7f0000000180)={0x18, 0x2}, 0x1e) 19:33:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) inotify_init() socket$alg(0x26, 0x5, 0x0) 19:33:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0), 0x0) 19:33:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050092}]}) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=""/8}, 0x18) 19:33:04 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000fff000/0x1000)=nil, 0x1000}}) 19:33:04 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000040)) 19:33:04 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f00000000c0)=""/190) 19:33:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)) [ 799.410677] audit: type=1326 audit(1529695984.409:1712): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17731 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:04 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000040)) 19:33:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050092}]}) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=""/8}, 0x18) 19:33:04 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000fff000/0x1000)=nil, 0x1000}}) 19:33:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) inotify_init() socket$alg(0x26, 0x5, 0x0) [ 799.634400] audit: type=1326 audit(1529695984.633:1713): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17759 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:04 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000040)) 19:33:04 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f00000000c0)=""/190) 19:33:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=""/8}, 0x18) 19:33:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)) [ 799.833392] audit: type=1326 audit(1529695984.832:1714): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17771 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) inotify_init() socket$alg(0x26, 0x5, 0x0) 19:33:05 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0), 0x0) 19:33:05 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000040)) 19:33:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f00000000c0)=""/190) 19:33:05 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)) 19:33:05 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) memfd_create(&(0x7f0000000080)='/\'-ppp1wlan0#trustedsecuritycgroup\'procppp0\x00', 0x0) 19:33:05 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000040)) 19:33:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$alg(0x26, 0x5, 0x0) 19:33:05 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)) 19:33:05 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0), 0x0) 19:33:05 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000fff000/0x1000)=nil, 0x1000}}) 19:33:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f00000000c0)=""/190) 19:33:05 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) memfd_create(&(0x7f0000000080)='/\'-ppp1wlan0#trustedsecuritycgroup\'procppp0\x00', 0x0) 19:33:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$alg(0x26, 0x5, 0x0) [ 800.691032] audit: type=1326 audit(1529695985.688:1715): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17821 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:05 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=""/8}, 0x18) 19:33:05 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000040)) 19:33:05 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0), 0x0) 19:33:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f00000000c0)=""/190) 19:33:05 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)) [ 800.856227] audit: type=1326 audit(1529695985.854:1716): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17830 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:05 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) memfd_create(&(0x7f0000000080)='/\'-ppp1wlan0#trustedsecuritycgroup\'procppp0\x00', 0x0) 19:33:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$alg(0x26, 0x5, 0x0) [ 800.945863] audit: type=1326 audit(1529695985.906:1717): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17838 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 800.965840] audit: type=1326 audit(1529695985.937:1718): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17840 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:06 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0), 0x0) 19:33:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f00000000c0)=""/190) 19:33:06 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) memfd_create(&(0x7f0000000080)='/\'-ppp1wlan0#trustedsecuritycgroup\'procppp0\x00', 0x0) 19:33:06 executing program 4: inotify_init() socket$alg(0x26, 0x5, 0x0) 19:33:06 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0), 0x0) 19:33:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000fff000/0x1000)=nil, 0x1000}}) 19:33:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f00000000c0)=""/190) 19:33:06 executing program 4: inotify_init() socket$alg(0x26, 0x5, 0x0) 19:33:06 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) memfd_create(&(0x7f0000000080)='/\'-ppp1wlan0#trustedsecuritycgroup\'procppp0\x00', 0x0) [ 801.644985] audit: type=1326 audit(1529695986.643:1719): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17877 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:06 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=""/8}, 0x18) 19:33:06 executing program 6: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0), 0x0) 19:33:06 executing program 4: inotify_init() socket$alg(0x26, 0x5, 0x0) 19:33:06 executing program 5: openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f00000000c0)=""/190) 19:33:06 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) memfd_create(&(0x7f0000000080)='/\'-ppp1wlan0#trustedsecuritycgroup\'procppp0\x00', 0x0) 19:33:06 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000040)) 19:33:06 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)) 19:33:06 executing program 5: openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f00000000c0)=""/190) 19:33:06 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) inotify_init() socket$alg(0x26, 0x5, 0x0) 19:33:06 executing program 6: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0), 0x0) 19:33:06 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) memfd_create(&(0x7f0000000080)='/\'-ppp1wlan0#trustedsecuritycgroup\'procppp0\x00', 0x0) 19:33:07 executing program 6: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0), 0x0) 19:33:07 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) inotify_init() socket$alg(0x26, 0x5, 0x0) 19:33:07 executing program 5: openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f00000000c0)=""/190) 19:33:07 executing program 3: openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) memfd_create(&(0x7f0000000080)='/\'-ppp1wlan0#trustedsecuritycgroup\'procppp0\x00', 0x0) 19:33:07 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0), 0x0) 19:33:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)) 19:33:07 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 19:33:07 executing program 3: openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) memfd_create(&(0x7f0000000080)='/\'-ppp1wlan0#trustedsecuritycgroup\'procppp0\x00', 0x0) 19:33:07 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) inotify_init() socket$alg(0x26, 0x5, 0x0) 19:33:07 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0), 0x0) 19:33:07 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000040)) 19:33:07 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f00000000c0)=""/190) 19:33:07 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 19:33:07 executing program 3: openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) memfd_create(&(0x7f0000000080)='/\'-ppp1wlan0#trustedsecuritycgroup\'procppp0\x00', 0x0) 19:33:07 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f00000000c0)=""/190) 19:33:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) inotify_init() socket$alg(0x26, 0x5, 0x0) 19:33:07 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0), 0x0) 19:33:08 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 19:33:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x0, {0x9}}, 0x14}, 0x1}, 0x0) 19:33:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) inotify_init() socket$alg(0x26, 0x5, 0x0) 19:33:08 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f00000000c0)=""/190) 19:33:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f00000000c0)=""/190) 19:33:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0), 0x0) 19:33:08 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) memfd_create(&(0x7f0000000080)='/\'-ppp1wlan0#trustedsecuritycgroup\'procppp0\x00', 0x0) 19:33:08 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 19:33:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x0, {0x9}}, 0x14}, 0x1}, 0x0) 19:33:08 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd4(0xffffffffffffffff, &(0x7f0000000300), 0x2, 0x0) 19:33:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) inotify_init() socket$alg(0x26, 0x5, 0x0) 19:33:08 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000040)={0x0, 'veth1_to_team\x00'}, 0x18) 19:33:08 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) memfd_create(&(0x7f0000000080)='/\'-ppp1wlan0#trustedsecuritycgroup\'procppp0\x00', 0x0) 19:33:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f00000000c0)=""/190) 19:33:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0), 0x0) 19:33:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x0, {0x9}}, 0x14}, 0x1}, 0x0) 19:33:09 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 19:33:09 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) inotify_init() socket$alg(0x26, 0x5, 0x0) 19:33:09 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000040)={0x0, 'veth1_to_team\x00'}, 0x18) 19:33:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd4(0xffffffffffffffff, &(0x7f0000000300), 0x2, 0x0) 19:33:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0), 0x0) 19:33:09 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) inotify_init() socket$alg(0x26, 0x5, 0x0) 19:33:09 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f00000000c0)=""/190) 19:33:09 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) memfd_create(&(0x7f0000000080)='/\'-ppp1wlan0#trustedsecuritycgroup\'procppp0\x00', 0x0) 19:33:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x0, {0x9}}, 0x14}, 0x1}, 0x0) 19:33:09 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000040)={0x0, 'veth1_to_team\x00'}, 0x18) 19:33:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd4(0xffffffffffffffff, &(0x7f0000000300), 0x2, 0x0) 19:33:09 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 19:33:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ed}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0), 0x0) 19:33:09 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) inotify_init() socket$alg(0x26, 0x5, 0x0) 19:33:09 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ed}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f00000000c0)=""/190) 19:33:09 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) memfd_create(&(0x7f0000000080)='/\'-ppp1wlan0#trustedsecuritycgroup\'procppp0\x00', 0x0) 19:33:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x0, {0x9}}, 0x14}, 0x1}, 0x0) 19:33:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd4(0xffffffffffffffff, &(0x7f0000000300), 0x2, 0x0) 19:33:09 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000040)={0x0, 'veth1_to_team\x00'}, 0x18) 19:33:09 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 19:33:09 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) inotify_init() socket$alg(0x26, 0x5, 0x0) 19:33:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ed}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0), 0x0) 19:33:09 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ed}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f00000000c0)=""/190) 19:33:09 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) memfd_create(&(0x7f0000000080)='/\'-ppp1wlan0#trustedsecuritycgroup\'procppp0\x00', 0x0) [ 804.783663] kauditd_printk_skb: 5 callbacks suppressed [ 804.783687] audit: type=1326 audit(1529695989.782:1725): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18080 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) signalfd4(0xffffffffffffffff, &(0x7f0000000300), 0x2, 0x0) 19:33:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x0, {0x9}}, 0x14}, 0x1}, 0x0) 19:33:09 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ed}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f00000000c0)=""/190) 19:33:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ed}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0), 0x0) 19:33:09 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) memfd_create(&(0x7f0000000080)='/\'-ppp1wlan0#trustedsecuritycgroup\'procppp0\x00', 0x0) 19:33:09 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000040)={0x0, 'veth1_to_team\x00'}, 0x18) 19:33:10 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 19:33:10 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) signalfd4(0xffffffffffffffff, &(0x7f0000000300), 0x2, 0x0) 19:33:10 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x0, {0x9}}, 0x14}, 0x1}, 0x0) 19:33:10 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0), 0x0) 19:33:10 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) memfd_create(&(0x7f0000000080)='/\'-ppp1wlan0#trustedsecuritycgroup\'procppp0\x00', 0x0) 19:33:10 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000040)={0x0, 'veth1_to_team\x00'}, 0x18) [ 805.323135] audit: type=1326 audit(1529695990.315:1726): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18126 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:10 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) inotify_init() socket$alg(0x26, 0x5, 0x0) 19:33:10 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f00000000c0)=""/190) 19:33:10 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 19:33:10 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) signalfd4(0xffffffffffffffff, &(0x7f0000000300), 0x2, 0x0) 19:33:10 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000040)={0x0, 'veth1_to_team\x00'}, 0x18) 19:33:10 executing program 7: openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x0, {0x9}}, 0x14}, 0x1}, 0x0) 19:33:10 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) memfd_create(&(0x7f0000000080)='/\'-ppp1wlan0#trustedsecuritycgroup\'procppp0\x00', 0x0) [ 805.704784] audit: type=1326 audit(1529695990.703:1727): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18139 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:10 executing program 7: openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x0, {0x9}}, 0x14}, 0x1}, 0x0) 19:33:10 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 19:33:10 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) memfd_create(&(0x7f0000000080)='/\'-ppp1wlan0#trustedsecuritycgroup\'procppp0\x00', 0x0) [ 805.763939] audit: type=1326 audit(1529695990.731:1728): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18143 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:10 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd4(0xffffffffffffffff, &(0x7f0000000300), 0x2, 0x0) 19:33:10 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000040)={0x0, 'veth1_to_team\x00'}, 0x18) 19:33:10 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 19:33:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0), 0x0) 19:33:11 executing program 7: openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x0, {0x9}}, 0x14}, 0x1}, 0x0) 19:33:11 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) memfd_create(&(0x7f0000000080)='/\'-ppp1wlan0#trustedsecuritycgroup\'procppp0\x00', 0x0) [ 806.223144] audit: type=1326 audit(1529695991.219:1729): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18178 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 806.257185] audit: type=1326 audit(1529695991.243:1730): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18180 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) inotify_init() socket$alg(0x26, 0x5, 0x0) 19:33:11 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f00000000c0)=""/190) 19:33:11 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd4(0xffffffffffffffff, &(0x7f0000000300), 0x2, 0x0) 19:33:11 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000040)={0x0, 'veth1_to_team\x00'}, 0x18) 19:33:11 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 19:33:11 executing program 7: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x0, {0x9}}, 0x14}, 0x1}, 0x0) 19:33:11 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd4(0xffffffffffffffff, &(0x7f0000000300), 0x2, 0x0) [ 806.643201] audit: type=1326 audit(1529695991.634:1731): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18187 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:11 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000040)={0x0, 'veth1_to_team\x00'}, 0x18) [ 806.732863] audit: type=1326 audit(1529695991.724:1732): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18199 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:11 executing program 7: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x0, {0x9}}, 0x14}, 0x1}, 0x0) 19:33:11 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 19:33:11 executing program 0: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd4(0xffffffffffffffff, &(0x7f0000000300), 0x2, 0x0) 19:33:11 executing program 2: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000040)={0x0, 'veth1_to_team\x00'}, 0x18) 19:33:11 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 19:33:12 executing program 0: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd4(0xffffffffffffffff, &(0x7f0000000300), 0x2, 0x0) 19:33:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0), 0x0) 19:33:12 executing program 2: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000040)={0x0, 'veth1_to_team\x00'}, 0x18) [ 807.200554] audit: type=1326 audit(1529695992.199:1733): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18233 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:12 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 19:33:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f00000000c0)=""/190) 19:33:12 executing program 7: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x0, {0x9}}, 0x14}, 0x1}, 0x0) 19:33:12 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) memfd_create(&(0x7f0000000080)='/\'-ppp1wlan0#trustedsecuritycgroup\'procppp0\x00', 0x0) 19:33:12 executing program 0: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd4(0xffffffffffffffff, &(0x7f0000000300), 0x2, 0x0) 19:33:12 executing program 2: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000040)={0x0, 'veth1_to_team\x00'}, 0x18) 19:33:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) readlinkat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=""/245, 0xf5) 19:33:12 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) [ 807.669318] audit: type=1326 audit(1529695992.667:1734): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18244 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd4(0xffffffffffffffff, &(0x7f0000000300), 0x2, 0x0) 19:33:12 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000040)={0x0, 'veth1_to_team\x00'}, 0x18) 19:33:12 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 19:33:12 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x0, {0x9}}, 0x14}, 0x1}, 0x0) 19:33:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) readlinkat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=""/245, 0xf5) 19:33:12 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x0, {0x9}}, 0x14}, 0x1}, 0x0) 19:33:13 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) readlinkat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=""/245, 0xf5) 19:33:13 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000040)={0x0, 'veth1_to_team\x00'}, 0x18) 19:33:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd4(0xffffffffffffffff, &(0x7f0000000300), 0x2, 0x0) 19:33:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x0) 19:33:13 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 19:33:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x0, {0x9}}, 0x14}, 0x1}, 0x0) 19:33:13 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000040)={0x0, 'veth1_to_team\x00'}, 0x18) 19:33:13 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) memfd_create(&(0x7f0000000080)='/\'-ppp1wlan0#trustedsecuritycgroup\'procppp0\x00', 0x0) 19:33:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd4(0xffffffffffffffff, &(0x7f0000000300), 0x2, 0x0) 19:33:13 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) readlinkat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=""/245, 0xf5) 19:33:13 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000100)) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000200), 0x4) 19:33:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x0, {0x9}}, 0x14}, 0x1}, 0x0) 19:33:13 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 19:33:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd4(0xffffffffffffffff, &(0x7f0000000300), 0x2, 0x0) 19:33:13 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000040)={0x0, 'veth1_to_team\x00'}, 0x18) 19:33:13 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) readlinkat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=""/245, 0xf5) 19:33:13 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000100)) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000200), 0x4) 19:33:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x0, {0x9}}, 0x14}, 0x1}, 0x0) 19:33:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x0) 19:33:13 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 19:33:13 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000040)={0x0, 'veth1_to_team\x00'}, 0x18) 19:33:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd4(0xffffffffffffffff, &(0x7f0000000300), 0x2, 0x0) 19:33:14 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) readlinkat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=""/245, 0xf5) 19:33:14 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) readlinkat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=""/245, 0xf5) 19:33:14 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 19:33:14 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000040)={0x0, 'veth1_to_team\x00'}, 0x18) 19:33:14 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000100)) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000200), 0x4) 19:33:14 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x0) 19:33:14 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x0, {0x9}}, 0x14}, 0x1}, 0x0) 19:33:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd4(0xffffffffffffffff, &(0x7f0000000300), 0x2, 0x0) 19:33:14 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 19:33:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd4(0xffffffffffffffff, &(0x7f0000000300), 0x2, 0x0) 19:33:14 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x0, {0x9}}, 0x14}, 0x1}, 0x0) 19:33:14 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000040)={0x0, 'veth1_to_team\x00'}, 0x18) 19:33:14 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x0) 19:33:14 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000100)) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000200), 0x4) 19:33:14 executing program 4: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) readlinkat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=""/245, 0xf5) [ 809.787894] kauditd_printk_skb: 5 callbacks suppressed [ 809.787918] audit: type=1326 audit(1529695994.786:1740): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18383 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:14 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 19:33:14 executing program 4: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) readlinkat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=""/245, 0xf5) 19:33:15 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000200), 0x4) 19:33:15 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 19:33:15 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x0) 19:33:15 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 19:33:15 executing program 4: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) readlinkat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=""/245, 0xf5) 19:33:15 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000200), 0x4) [ 810.550680] audit: type=1326 audit(1529695995.549:1741): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18419 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:15 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) readlinkat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=""/245, 0xf5) 19:33:15 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x0) 19:33:15 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd4(0xffffffffffffffff, &(0x7f0000000300), 0x2, 0x0) 19:33:15 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000200), 0x4) 19:33:15 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000040)={0x0, 'veth1_to_team\x00'}, 0x18) 19:33:15 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x0, {0x9}}, 0x14}, 0x1}, 0x0) 19:33:15 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) [ 810.778845] audit: type=1326 audit(1529695995.777:1742): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18433 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:15 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) readlinkat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=""/245, 0xf5) 19:33:15 executing program 5: socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000100)) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000200), 0x4) [ 810.870916] audit: type=1326 audit(1529695995.825:1743): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18436 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:15 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 19:33:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x0) [ 811.019685] audit: type=1326 audit(1529695996.017:1744): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18441 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:16 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 19:33:16 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) readlinkat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=""/245, 0xf5) 19:33:16 executing program 5: socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000100)) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000200), 0x4) 19:33:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 19:33:16 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000040)) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x0) 19:33:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) readlinkat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=""/245, 0xf5) [ 811.520578] audit: type=1326 audit(1529695996.519:1745): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18474 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:16 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000040)) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x0) 19:33:16 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd4(0xffffffffffffffff, &(0x7f0000000300), 0x2, 0x0) 19:33:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 19:33:16 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000040)={0x0, 'veth1_to_team\x00'}, 0x18) 19:33:16 executing program 5: socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000100)) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000200), 0x4) 19:33:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) readlinkat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=""/245, 0xf5) 19:33:16 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000040)) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x0) 19:33:16 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x0, {0x9}}, 0x14}, 0x1}, 0x0) [ 811.800943] audit: type=1326 audit(1529695996.799:1746): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18492 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:16 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 19:33:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) readlinkat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=""/245, 0xf5) [ 811.915351] audit: type=1326 audit(1529695996.913:1747): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18501 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 811.986224] audit: type=1326 audit(1529695996.951:1748): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18505 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:17 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 19:33:17 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x0) 19:33:17 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000100)) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000200), 0x4) 19:33:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ed}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) readlinkat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=""/245, 0xf5) 19:33:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f3}]}) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, 0x0) 19:33:17 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 19:33:17 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x0) 19:33:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000240)) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x9, 0x3, 0x220, 0x130, 0xffffffff, 0xffffffff, 0x130, 0xffffffff, 0x228, 0xffffffff, 0xffffffff, 0x228, 0xffffffff, 0x3, &(0x7f0000000400), {[{{@uncond, 0x0, 0x98, 0xb8}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x98, 0xd0}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x280) 19:33:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ed}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) readlinkat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=""/245, 0xf5) 19:33:17 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000000)) ioprio_get$uid(0x0, 0x0) 19:33:17 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000180)=""/174, &(0x7f0000000080)=0xae) 19:33:17 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 19:33:17 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000100)) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000200), 0x4) 19:33:17 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x0) 19:33:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ed}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) readlinkat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=""/245, 0xf5) 19:33:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) dup(0xffffffffffffffff) 19:33:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000240)) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x9, 0x3, 0x220, 0x130, 0xffffffff, 0xffffffff, 0x130, 0xffffffff, 0x228, 0xffffffff, 0xffffffff, 0x228, 0xffffffff, 0x3, &(0x7f0000000400), {[{{@uncond, 0x0, 0x98, 0xb8}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x98, 0xd0}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x280) 19:33:18 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 19:33:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x0) 19:33:18 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) readlinkat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=""/245, 0xf5) 19:33:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000000)) ioprio_get$uid(0x0, 0x0) 19:33:18 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000180)=""/174, &(0x7f0000000080)=0xae) 19:33:18 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000100)) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000200), 0x4) [ 813.177611] audit: type=1326 audit(1529695998.176:1749): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18587 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000000)) 19:33:18 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 19:33:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x0) 19:33:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000240)) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x9, 0x3, 0x220, 0x130, 0xffffffff, 0xffffffff, 0x130, 0xffffffff, 0x228, 0xffffffff, 0xffffffff, 0x228, 0xffffffff, 0x3, &(0x7f0000000400), {[{{@uncond, 0x0, 0x98, 0xb8}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x98, 0xd0}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x280) 19:33:18 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000180)=""/174, &(0x7f0000000080)=0xae) 19:33:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000000)) ioprio_get$uid(0x0, 0x0) 19:33:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x0) 19:33:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000100)) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000200), 0x4) 19:33:18 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 19:33:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) syz_open_pts(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000001700)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f00000016c0)={&(0x7f00000002c0)={0x14}, 0x14}, 0x1}, 0x0) 19:33:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000240)) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x9, 0x3, 0x220, 0x130, 0xffffffff, 0xffffffff, 0x130, 0xffffffff, 0x228, 0xffffffff, 0xffffffff, 0x228, 0xffffffff, 0x3, &(0x7f0000000400), {[{{@uncond, 0x0, 0x98, 0xb8}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x98, 0xd0}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x280) 19:33:18 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000180)=""/174, &(0x7f0000000080)=0xae) 19:33:19 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) readlinkat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=""/245, 0xf5) 19:33:19 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023d}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x0) 19:33:19 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000000)) ioprio_get$uid(0x0, 0x0) 19:33:19 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 19:33:19 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000100)) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000200), 0x4) 19:33:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000000)) sched_getscheduler(0x0) 19:33:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x9, 0x3, 0x220, 0x130, 0xffffffff, 0xffffffff, 0x130, 0xffffffff, 0x228, 0xffffffff, 0xffffffff, 0x228, 0xffffffff, 0x3, &(0x7f0000000400), {[{{@uncond, 0x0, 0x98, 0xb8}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x98, 0xd0}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x280) 19:33:19 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000180)=""/174, &(0x7f0000000080)=0xae) 19:33:19 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 19:33:19 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023d}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x0) 19:33:19 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000180)=""/174, &(0x7f0000000080)=0xae) 19:33:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x9, 0x3, 0x220, 0x130, 0xffffffff, 0xffffffff, 0x130, 0xffffffff, 0x228, 0xffffffff, 0xffffffff, 0x228, 0xffffffff, 0x3, &(0x7f0000000400), {[{{@uncond, 0x0, 0x98, 0xb8}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x98, 0xd0}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x280) 19:33:19 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioprio_get$uid(0x0, 0x0) 19:33:19 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000100)) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000200), 0x4) 19:33:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) 19:33:19 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 19:33:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) readlinkat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=""/245, 0xf5) 19:33:20 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023d}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x0) 19:33:20 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000180)=""/174, &(0x7f0000000080)=0xae) 19:33:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x9, 0x3, 0x220, 0x130, 0xffffffff, 0xffffffff, 0x130, 0xffffffff, 0x228, 0xffffffff, 0xffffffff, 0x228, 0xffffffff, 0x3, &(0x7f0000000400), {[{{@uncond, 0x0, 0x98, 0xb8}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x98, 0xd0}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x280) 19:33:20 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioprio_get$uid(0x0, 0x0) 19:33:20 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) seccomp(0x0, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000001c0)}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000)) 19:33:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 19:33:20 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000100)) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000200), 0x4) [ 815.075172] kauditd_printk_skb: 1 callbacks suppressed [ 815.075194] audit: type=1326 audit(1529696000.073:1751): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18701 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 19:33:20 executing program 1: ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000240)) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x9, 0x3, 0x220, 0x130, 0xffffffff, 0xffffffff, 0x130, 0xffffffff, 0x228, 0xffffffff, 0xffffffff, 0x228, 0xffffffff, 0x3, &(0x7f0000000400), {[{{@uncond, 0x0, 0x98, 0xb8}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x98, 0xd0}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x280) 19:33:20 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioprio_get$uid(0x0, 0x0) 19:33:20 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x0) 19:33:20 executing program 0: socket$inet6(0xa, 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000180)=""/174, &(0x7f0000000080)=0xae) 19:33:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) 19:33:20 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000100)) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000200), 0x4) [ 815.409788] audit: type=1326 audit(1529696000.408:1752): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18730 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:20 executing program 1: ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000240)) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x9, 0x3, 0x220, 0x130, 0xffffffff, 0xffffffff, 0x130, 0xffffffff, 0x228, 0xffffffff, 0xffffffff, 0x228, 0xffffffff, 0x3, &(0x7f0000000400), {[{{@uncond, 0x0, 0x98, 0xb8}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x98, 0xd0}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x280) 19:33:20 executing program 1: ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000240)) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x9, 0x3, 0x220, 0x130, 0xffffffff, 0xffffffff, 0x130, 0xffffffff, 0x228, 0xffffffff, 0xffffffff, 0x228, 0xffffffff, 0x3, &(0x7f0000000400), {[{{@uncond, 0x0, 0x98, 0xb8}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x98, 0xd0}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x280) 19:33:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) 19:33:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 19:33:20 executing program 7: ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000000)) ioprio_get$uid(0x0, 0x0) 19:33:20 executing program 0: socket$inet6(0xa, 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000180)=""/174, &(0x7f0000000080)=0xae) 19:33:20 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000100)) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000200), 0x4) 19:33:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/144, 0x90, 0x0, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) [ 816.040253] audit: type=1326 audit(1529696001.038:1753): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18762 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:21 executing program 7: ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000000)) ioprio_get$uid(0x0, 0x0) 19:33:21 executing program 1: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000240)) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x9, 0x3, 0x220, 0x130, 0xffffffff, 0xffffffff, 0x130, 0xffffffff, 0x228, 0xffffffff, 0xffffffff, 0x228, 0xffffffff, 0x3, &(0x7f0000000400), {[{{@uncond, 0x0, 0x98, 0xb8}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x98, 0xd0}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x280) 19:33:21 executing program 0: socket$inet6(0xa, 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000180)=""/174, &(0x7f0000000080)=0xae) 19:33:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000100)) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000200), 0x4) 19:33:21 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x0) 19:33:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) 19:33:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/144, 0x90, 0x0, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 19:33:21 executing program 7: ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000000)) ioprio_get$uid(0x0, 0x0) 19:33:21 executing program 1: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000240)) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x9, 0x3, 0x220, 0x130, 0xffffffff, 0xffffffff, 0x130, 0xffffffff, 0x228, 0xffffffff, 0xffffffff, 0x228, 0xffffffff, 0x3, &(0x7f0000000400), {[{{@uncond, 0x0, 0x98, 0xb8}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x98, 0xd0}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x280) [ 816.333251] audit: type=1326 audit(1529696001.331:1754): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18789 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:21 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000180)=""/174, &(0x7f0000000080)=0xae) [ 816.497537] audit: type=1326 audit(1529696001.496:1755): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18803 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:21 executing program 1: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000240)) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x9, 0x3, 0x220, 0x130, 0xffffffff, 0xffffffff, 0x130, 0xffffffff, 0x228, 0xffffffff, 0xffffffff, 0x228, 0xffffffff, 0x3, &(0x7f0000000400), {[{{@uncond, 0x0, 0x98, 0xb8}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x98, 0xd0}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x280) 19:33:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 19:33:21 executing program 7: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000000)) ioprio_get$uid(0x0, 0x0) 19:33:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) 19:33:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/144, 0x90, 0x0, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 19:33:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000240)) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x9, 0x3, 0x220, 0x130, 0xffffffff, 0xffffffff, 0x130, 0xffffffff, 0x228, 0xffffffff, 0xffffffff, 0x228, 0xffffffff, 0x3, &(0x7f0000000400), {[{{@uncond, 0x0, 0x98, 0xb8}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x98, 0xd0}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x280) 19:33:21 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000180)=""/174, &(0x7f0000000080)=0xae) [ 817.041791] audit: type=1326 audit(1529696002.040:1756): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18826 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:22 executing program 7: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000000)) ioprio_get$uid(0x0, 0x0) 19:33:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000240)) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x9, 0x3, 0x220, 0x130, 0xffffffff, 0xffffffff, 0x130, 0xffffffff, 0x228, 0xffffffff, 0xffffffff, 0x228, 0xffffffff, 0x3, &(0x7f0000000400), {[{{@uncond, 0x0, 0x98, 0xb8}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x98, 0xd0}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x280) 19:33:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000100)) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000200), 0x4) [ 817.386370] audit: type=1326 audit(1529696002.385:1757): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18847 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x0) 19:33:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/144, 0x90, 0x0, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 19:33:22 executing program 7: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000000)) ioprio_get$uid(0x0, 0x0) 19:33:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000240)) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x9, 0x3, 0x220, 0x130, 0xffffffff, 0xffffffff, 0x130, 0xffffffff, 0x228, 0xffffffff, 0xffffffff, 0x228, 0xffffffff, 0x3, &(0x7f0000000400), {[{{@uncond, 0x0, 0x98, 0xb8}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x98, 0xd0}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x280) 19:33:22 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000180)=""/174, &(0x7f0000000080)=0xae) [ 817.533440] audit: type=1326 audit(1529696002.532:1758): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18857 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:22 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000000)) ioprio_get$uid(0x0, 0x0) 19:33:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000240)) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x9, 0x3, 0x220, 0x130, 0xffffffff, 0xffffffff, 0x130, 0xffffffff, 0x228, 0xffffffff, 0xffffffff, 0x228, 0xffffffff, 0x3, &(0x7f0000000400), {[{{@uncond, 0x0, 0x98, 0xb8}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x98, 0xd0}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x280) 19:33:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 19:33:22 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket$inet6(0xa, 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000180)=""/174, &(0x7f0000000080)=0xae) [ 817.960920] audit: type=1326 audit(1529696002.958:1759): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18877 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) 19:33:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000000)) ioprio_get$uid(0x0, 0x0) 19:33:23 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/144, 0x90, 0x0, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 19:33:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000240)) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x9, 0x3, 0x220, 0x130, 0xffffffff, 0xffffffff, 0x130, 0xffffffff, 0x228, 0xffffffff, 0xffffffff, 0x228, 0xffffffff, 0x3, &(0x7f0000000400), {[{{@uncond, 0x0, 0x98, 0xb8}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x98, 0xd0}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x280) 19:33:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000100)) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000200), 0x4) 19:33:23 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000000)) 19:33:23 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket$inet6(0xa, 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000180)=""/174, &(0x7f0000000080)=0xae) [ 818.690139] audit: type=1326 audit(1529696003.688:1760): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18886 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000000)) ioprio_get$uid(0x0, 0x0) 19:33:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000240)) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x9, 0x3, 0x220, 0x130, 0xffffffff, 0xffffffff, 0x130, 0xffffffff, 0x228, 0xffffffff, 0xffffffff, 0x228, 0xffffffff, 0x3, &(0x7f0000000400), {[{{@uncond, 0x0, 0x98, 0xb8}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x98, 0xd0}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x280) 19:33:23 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/144, 0x90, 0x0, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 19:33:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) 19:33:24 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000180)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[]}, 0x1}, 0x0) 19:33:24 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket$inet6(0xa, 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000180)=""/174, &(0x7f0000000080)=0xae) 19:33:24 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000000)) 19:33:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000000)) ioprio_get$uid(0x0, 0x0) 19:33:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000240)) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x9, 0x3, 0x220, 0x130, 0xffffffff, 0xffffffff, 0x130, 0xffffffff, 0x228, 0xffffffff, 0xffffffff, 0x228, 0xffffffff, 0x3, &(0x7f0000000400), {[{{@uncond, 0x0, 0x98, 0xb8}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x98, 0xd0}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x280) 19:33:24 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/144, 0x90, 0x0, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 19:33:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) 19:33:24 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000180)=""/174, &(0x7f0000000080)=0xae) 19:33:24 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000180)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[]}, 0x1}, 0x0) 19:33:24 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000180)=""/174, &(0x7f0000000080)=0xae) 19:33:24 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000000)) 19:33:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000000)) ioprio_get$uid(0x0, 0x0) 19:33:24 executing program 4: shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/144, 0x90, 0x0, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 19:33:24 executing program 2: getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) 19:33:24 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000180)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[]}, 0x1}, 0x0) 19:33:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501ea}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000003c0)="d344197711008f4e1d56a8dd49bbc5ae", 0xffffffffffffff80) 19:33:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000000)) ioprio_get$uid(0x0, 0x0) 19:33:24 executing program 2: getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) 19:33:24 executing program 4: shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/144, 0x90, 0x0, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 19:33:24 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000180)=""/174, &(0x7f0000000080)=0xae) 19:33:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000240)) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x9, 0x3, 0x220, 0x130, 0xffffffff, 0xffffffff, 0x130, 0xffffffff, 0x228, 0xffffffff, 0xffffffff, 0x228, 0xffffffff, 0x3, &(0x7f0000000400), {[{{@uncond, 0x0, 0x98, 0xb8}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x98, 0xd0}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x280) 19:33:25 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000000)) 19:33:25 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000180)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[]}, 0x1}, 0x0) 19:33:25 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000200), 0xc) 19:33:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000000)) ioprio_get$uid(0x0, 0x0) 19:33:25 executing program 2: getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) 19:33:25 executing program 4: shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/144, 0x90, 0x0, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 19:33:25 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000180)=""/174, &(0x7f0000000080)=0xae) [ 820.187423] kauditd_printk_skb: 1 callbacks suppressed [ 820.187444] audit: type=1326 audit(1529696005.186:1762): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18998 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:25 executing program 4: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/144, 0x90, 0x0, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) [ 820.248604] audit: type=1326 audit(1529696005.234:1763): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18999 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:25 executing program 2: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) 19:33:25 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000180)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[]}, 0x1}, 0x0) 19:33:25 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000000)) [ 820.341229] audit: type=1326 audit(1529696005.271:1764): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19002 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:25 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000200), 0xc) 19:33:25 executing program 2: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) 19:33:25 executing program 4: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/144, 0x90, 0x0, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 19:33:25 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000180)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[]}, 0x1}, 0x0) 19:33:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000240)) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x9, 0x3, 0x220, 0x130, 0xffffffff, 0xffffffff, 0x130, 0xffffffff, 0x228, 0xffffffff, 0xffffffff, 0x228, 0xffffffff, 0x3, &(0x7f0000000400), {[{{@uncond, 0x0, 0x98, 0xb8}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x98, 0xd0}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x280) 19:33:26 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000000)) 19:33:26 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000200), 0xc) 19:33:26 executing program 2: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) 19:33:26 executing program 4: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/144, 0x90, 0x0, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 19:33:26 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000180)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[]}, 0x1}, 0x0) 19:33:26 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000180)=""/174, &(0x7f0000000080)=0xae) 19:33:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000000)) ioprio_get$uid(0x0, 0x0) [ 821.179126] audit: type=1326 audit(1529696006.177:1765): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19049 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) 19:33:26 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000180)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[]}, 0x1}, 0x0) [ 821.254785] audit: type=1326 audit(1529696006.204:1766): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19057 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 821.274714] audit: type=1326 audit(1529696006.225:1767): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19059 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/144, 0x90, 0x0, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 19:33:26 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000000)) 19:33:26 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000200), 0xc) 19:33:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) 19:33:26 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000180)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[]}, 0x1}, 0x0) 19:33:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/144, 0x90, 0x0, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 19:33:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000000)) ioprio_get$uid(0x0, 0x0) 19:33:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/144, 0x90, 0x0, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 19:33:27 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000180)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[]}, 0x1}, 0x0) 19:33:27 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000180)=""/174, &(0x7f0000000080)=0xae) 19:33:27 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000200), 0xc) 19:33:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) 19:33:27 executing program 6: dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000000)) 19:33:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0) [ 822.154437] audit: type=1326 audit(1529696007.153:1768): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19103 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) 19:33:27 executing program 6: dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000000)) 19:33:27 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000180)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[]}, 0x1}, 0x0) [ 822.246314] audit: type=1326 audit(1529696007.242:1769): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19102 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/144, 0x90, 0x0, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 19:33:27 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000200), 0xc) 19:33:27 executing program 6: dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000000)) 19:33:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0) 19:33:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) 19:33:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0) 19:33:28 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000180)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[]}, 0x1}, 0x0) 19:33:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/144, 0x90, 0x0, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 19:33:28 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000200), 0xc) 19:33:28 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000000)) 19:33:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) 19:33:28 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 19:33:28 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 19:33:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/144, 0x90, 0x0, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 19:33:28 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000180)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[]}, 0x1}, 0x0) 19:33:28 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000000)) 19:33:28 executing program 5: openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000200), 0xc) 19:33:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) 19:33:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0) 19:33:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/144, 0x90, 0x0, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) [ 823.357840] audit: type=1326 audit(1529696008.356:1770): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19179 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:28 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 19:33:28 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) geteuid() 19:33:28 executing program 5: openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000200), 0xc) 19:33:28 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000000)) 19:33:28 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000180)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[]}, 0x1}, 0x0) [ 823.495154] audit: type=1326 audit(1529696008.493:1771): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19189 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0) 19:33:28 executing program 5: openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000200), 0xc) 19:33:28 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) geteuid() 19:33:28 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 19:33:28 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000000)) 19:33:28 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000180)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[]}, 0x1}, 0x0) 19:33:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0) 19:33:28 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000200), 0xc) 19:33:29 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) 19:33:29 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000000)) 19:33:29 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/144, 0x90, 0x0, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 19:33:29 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) geteuid() 19:33:29 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 19:33:29 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000180)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[]}, 0x1}, 0x0) 19:33:29 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000200), 0xc) 19:33:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0) 19:33:29 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000000)) 19:33:29 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000200), 0xc) 19:33:29 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000000)) 19:33:29 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000180)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[]}, 0x1}, 0x0) 19:33:29 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) geteuid() 19:33:29 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6_tcp(0xa, 0x1, 0x0) 19:33:29 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0) 19:33:29 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000200), 0xc) 19:33:30 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) 19:33:30 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000180)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[]}, 0x1}, 0x0) [ 825.224383] kauditd_printk_skb: 2 callbacks suppressed [ 825.224405] audit: type=1326 audit(1529696010.222:1774): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19289 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/144, 0x90, 0x0, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 19:33:30 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000000)) 19:33:30 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) geteuid() 19:33:30 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6_tcp(0xa, 0x1, 0x0) 19:33:30 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0) 19:33:30 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000200), 0xc) 19:33:30 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000180)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[]}, 0x1}, 0x0) 19:33:30 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000180)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[]}, 0x1}, 0x0) [ 825.465264] audit: type=1326 audit(1529696010.460:1775): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19306 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:30 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0) 19:33:30 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000000)) 19:33:30 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000200), 0xc) 19:33:30 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6_tcp(0xa, 0x1, 0x0) 19:33:30 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) geteuid() [ 825.589296] audit: type=1326 audit(1529696010.587:1776): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19310 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:30 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0) 19:33:31 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000000)) 19:33:31 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000200), 0xc) [ 826.168025] audit: type=1326 audit(1529696011.166:1777): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19335 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:31 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) geteuid() 19:33:31 executing program 7: openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 19:33:31 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0) 19:33:31 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000200), 0xc) 19:33:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000000c0)) 19:33:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) shmctl$IPC_RMID(0x0, 0x0) 19:33:31 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0) 19:33:31 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000200), 0xc) 19:33:31 executing program 7: openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 19:33:31 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000180)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[]}, 0x1}, 0x0) 19:33:31 executing program 0: socket$inet6(0xa, 0x0, 0x0) geteuid() 19:33:31 executing program 7: openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) [ 826.650272] audit: type=1326 audit(1529696011.648:1778): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19370 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0) 19:33:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000000c0)) 19:33:32 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000000)) 19:33:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) shmctl$IPC_RMID(0x0, 0x0) 19:33:32 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000200), 0xc) 19:33:32 executing program 0: socket$inet6(0xa, 0x0, 0x0) geteuid() 19:33:32 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 19:33:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0) 19:33:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000000c0)) [ 827.114850] audit: type=1326 audit(1529696012.113:1779): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19398 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 827.178882] audit: type=1326 audit(1529696012.175:1780): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19405 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:32 executing program 0: socket$inet6(0xa, 0x0, 0x0) geteuid() 19:33:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0) 19:33:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) shmctl$IPC_RMID(0x0, 0x0) 19:33:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000000c0)) 19:33:32 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000180)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[]}, 0x1}, 0x0) 19:33:32 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 19:33:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0) 19:33:32 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) geteuid() 19:33:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) shmctl$IPC_RMID(0x0, 0x0) [ 827.615509] audit: type=1326 audit(1529696012.613:1781): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19434 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:33 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000000)) 19:33:33 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 19:33:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0) 19:33:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) shmctl$IPC_RMID(0x0, 0x0) 19:33:33 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) geteuid() 19:33:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000000c0)) 19:33:33 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000200), 0xc) [ 828.129367] audit: type=1326 audit(1529696013.127:1782): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19451 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000000c0)) 19:33:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) shmctl$IPC_RMID(0x0, 0x0) 19:33:33 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 19:33:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0) [ 828.212454] audit: type=1326 audit(1529696013.152:1783): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19460 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0) 19:33:33 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) geteuid() 19:33:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) shmctl$IPC_RMID(0x0, 0x0) 19:33:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000000c0)) 19:33:33 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'IDLETIMER\x00'}, &(0x7f0000000180)=0xfffffffffffffda5) 19:33:34 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000200), 0xc) 19:33:34 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 19:33:34 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000000c0)) 19:33:34 executing program 2: shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) shmctl$IPC_RMID(0x0, 0x0) 19:33:34 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket$inet6(0xa, 0x0, 0x0) geteuid() 19:33:34 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) fcntl$getown(0xffffffffffffff9c, 0x9) 19:33:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 19:33:34 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 19:33:34 executing program 2: shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) shmctl$IPC_RMID(0x0, 0x0) 19:33:34 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000000c0)) 19:33:34 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket$inet6(0xa, 0x0, 0x0) geteuid() 19:33:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0) 19:33:34 executing program 2: shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) shmctl$IPC_RMID(0x0, 0x0) 19:33:34 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) sysinfo(&(0x7f0000000180)=""/214) prctl$setname(0xf, &(0x7f00000000c0)='/dev/zero\x00') 19:33:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 19:33:34 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 19:33:35 executing program 2: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) shmctl$IPC_RMID(0x0, 0x0) 19:33:35 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000000c0)) 19:33:35 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket$inet6(0xa, 0x0, 0x0) geteuid() 19:33:35 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000000)) 19:33:35 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 19:33:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 19:33:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) sysinfo(&(0x7f0000000180)=""/214) prctl$setname(0xf, &(0x7f00000000c0)='/dev/zero\x00') 19:33:35 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000000c0)) 19:33:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) sysinfo(&(0x7f0000000180)=""/214) prctl$setname(0xf, &(0x7f00000000c0)='/dev/zero\x00') 19:33:35 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 19:33:35 executing program 2: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) shmctl$IPC_RMID(0x0, 0x0) 19:33:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0) 19:33:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 19:33:35 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) geteuid() 19:33:35 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000000)) 19:33:35 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 19:33:35 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000000c0)) 19:33:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) sysinfo(&(0x7f0000000180)=""/214) prctl$setname(0xf, &(0x7f00000000c0)='/dev/zero\x00') 19:33:35 executing program 2: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) shmctl$IPC_RMID(0x0, 0x0) [ 830.511004] kauditd_printk_skb: 3 callbacks suppressed [ 830.511031] audit: type=1326 audit(1529696015.509:1787): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19605 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:35 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000000c0)) [ 830.575918] audit: type=1326 audit(1529696015.553:1788): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19610 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) prctl$setname(0xf, &(0x7f00000000c0)='/dev/zero\x00') 19:33:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 19:33:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) shmctl$IPC_RMID(0x0, 0x0) 19:33:35 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) geteuid() 19:33:35 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000000)) 19:33:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000000c0)) 19:33:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 19:33:36 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 19:33:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) prctl$setname(0xf, &(0x7f00000000c0)='/dev/zero\x00') 19:33:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) shmctl$IPC_RMID(0x0, 0x0) 19:33:36 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) geteuid() 19:33:36 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000000)) 19:33:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000000c0)) 19:33:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) creat(&(0x7f00000002c0)='./file0\x00', 0x0) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000280)=""/33) 19:33:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) [ 831.516918] audit: type=1326 audit(1529696016.515:1789): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19654 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000000c0)) 19:33:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) shmctl$IPC_RMID(0x0, 0x0) 19:33:36 executing program 3: dup2(0xffffffffffffff9c, 0xffffffffffffff9c) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 19:33:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) prctl$setname(0xf, &(0x7f00000000c0)='/dev/zero\x00') 19:33:36 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) geteuid() 19:33:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ed}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000000c0)) 19:33:36 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000000)) [ 831.773434] audit: type=1326 audit(1529696016.772:1790): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19684 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:36 executing program 3: dup2(0xffffffffffffff9c, 0xffffffffffffff9c) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 19:33:37 executing program 6: sysinfo(&(0x7f0000000180)=""/214) prctl$setname(0xf, &(0x7f00000000c0)='/dev/zero\x00') 19:33:37 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 19:33:37 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket(0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) 19:33:37 executing program 3: dup2(0xffffffffffffff9c, 0xffffffffffffff9c) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 19:33:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) shmctl$IPC_RMID(0x0, 0x0) 19:33:37 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000000)) 19:33:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ed}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000000c0)) [ 832.488634] audit: type=1326 audit(1529696017.487:1791): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19717 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) shmctl$IPC_RMID(0x0, 0x0) 19:33:37 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 19:33:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ed}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000000c0)) 19:33:37 executing program 6: sysinfo(&(0x7f0000000180)=""/214) prctl$setname(0xf, &(0x7f00000000c0)='/dev/zero\x00') 19:33:37 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000000)) 19:33:37 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) geteuid() 19:33:37 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket(0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) 19:33:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000000c0)) 19:33:37 executing program 6: sysinfo(&(0x7f0000000180)=""/214) prctl$setname(0xf, &(0x7f00000000c0)='/dev/zero\x00') 19:33:37 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) [ 832.835941] audit: type=1326 audit(1529696017.834:1792): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19737 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 832.915606] audit: type=1326 audit(1529696017.872:1793): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19743 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:38 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket(0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) 19:33:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) shmctl$IPC_RMID(0x0, 0x0) 19:33:38 executing program 5: socket$inet6(0xa, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000000)) 19:33:38 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) sysinfo(&(0x7f0000000180)=""/214) prctl$setname(0xf, &(0x7f00000000c0)='/dev/zero\x00') 19:33:38 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 19:33:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000cc0)=@nat={'nat\x00', 0x19, 0x5, 0x90, [0x20000400, 0x0, 0x0, 0x20000890, 0x20000968], 0x0, &(0x7f0000000140), &(0x7f0000000400)=[{0x0, '\x00', 0x2}, {0x0, '\x00', 0x3}, {0x0, '\x00', 0x4}]}, 0x108) 19:33:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) inotify_init() ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f00000000c0)) 19:33:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) shmctl$IPC_RMID(0x0, 0x0) 19:33:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 19:33:38 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) sysinfo(&(0x7f0000000180)=""/214) prctl$setname(0xf, &(0x7f00000000c0)='/dev/zero\x00') 19:33:38 executing program 5: socket$inet6(0xa, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000000)) [ 833.656768] audit: type=1326 audit(1529696018.655:1794): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19777 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 19:33:38 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) sysinfo(&(0x7f0000000180)=""/214) prctl$setname(0xf, &(0x7f00000000c0)='/dev/zero\x00') 19:33:38 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket(0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) 19:33:38 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000000c0)) 19:33:38 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) geteuid() 19:33:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) memfd_create(&(0x7f00000000c0)='/dev/zero\x00', 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={{0x77359400}}) 19:33:38 executing program 5: socket$inet6(0xa, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000000)) [ 833.891676] audit: type=1326 audit(1529696018.890:1795): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19799 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 833.966669] audit: type=1326 audit(1529696018.924:1796): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19801 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) sysinfo(&(0x7f0000000180)=""/214) prctl$setname(0xf, &(0x7f00000000c0)='/dev/zero\x00') 19:33:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 19:33:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) memfd_create(&(0x7f00000000c0)='/dev/zero\x00', 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={{0x77359400}}) 19:33:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 19:33:39 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000000)) 19:33:39 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) 19:33:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) shmctl$IPC_RMID(0x0, 0x0) 19:33:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) memfd_create(&(0x7f00000000c0)='/dev/zero\x00', 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={{0x77359400}}) 19:33:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) sysinfo(&(0x7f0000000180)=""/214) prctl$setname(0xf, &(0x7f00000000c0)='/dev/zero\x00') 19:33:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 19:33:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000000c0)) 19:33:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) sysinfo(&(0x7f0000000180)=""/214) prctl$setname(0xf, &(0x7f00000000c0)='/dev/zero\x00') 19:33:39 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) 19:33:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) memfd_create(&(0x7f00000000c0)='/dev/zero\x00', 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={{0x77359400}}) 19:33:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 19:33:39 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000000)) 19:33:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0)={@rand_addr, @dev}, &(0x7f0000000400)=0xc) 19:33:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 19:33:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501cd}]}) sysinfo(&(0x7f0000000180)=""/214) prctl$setname(0xf, &(0x7f00000000c0)='/dev/zero\x00') 19:33:40 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) 19:33:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={{0x77359400}}) 19:33:40 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000000)) 19:33:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) shmctl$IPC_RMID(0x0, 0x0) 19:33:40 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f00000000c0)) 19:33:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501cd}]}) sysinfo(&(0x7f0000000180)=""/214) prctl$setname(0xf, &(0x7f00000000c0)='/dev/zero\x00') 19:33:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={{0x77359400}}) [ 835.559258] kauditd_printk_skb: 3 callbacks suppressed [ 835.559277] audit: type=1326 audit(1529696020.557:1800): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19903 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:40 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x480, 0x0, 0x140, 0x258, 0x398, 0x398, 0x398, 0x4, &(0x7f00000000c0), {[{{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @empty, @local={0xac, 0x14, 0x14, 0xaa}}}}, {{@uncond, 0xf0, 0x118}, @unspec=@AUDIT={0x28, 'AUDIT\x00'}}, {{@arp={@dev={0xac, 0x14, 0x14}, @broadcast=0xffffffff, 0x0, 0x0, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, @mac=@link_local={0x1, 0x80, 0xc2}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz_tun\x00', 'veth0_to_team\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @multicast1=0xe0000001, @multicast1=0xe0000001}}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4d0) 19:33:40 executing program 1: socket(0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) 19:33:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000180), 0x10) 19:33:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501cd}]}) sysinfo(&(0x7f0000000180)=""/214) prctl$setname(0xf, &(0x7f00000000c0)='/dev/zero\x00') 19:33:40 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket$inet6(0xa, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000000)) 19:33:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={{0x77359400}}) 19:33:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) sysinfo(&(0x7f0000000180)=""/214) prctl$setname(0xf, &(0x7f00000000c0)='/dev/zero\x00') [ 835.917891] audit: type=1326 audit(1529696020.916:1801): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19929 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 19:33:40 executing program 7: memfd_create(&(0x7f00000000c0)='/dev/zero\x00', 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={{0x77359400}}) 19:33:40 executing program 1: socket(0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) 19:33:40 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket$inet6(0xa, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000000)) 19:33:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000180), 0x10) [ 836.097253] audit: type=1326 audit(1529696021.095:1802): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19941 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:41 executing program 1: socket(0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) 19:33:41 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x480, 0x0, 0x140, 0x258, 0x398, 0x398, 0x398, 0x4, &(0x7f00000000c0), {[{{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @empty, @local={0xac, 0x14, 0x14, 0xaa}}}}, {{@uncond, 0xf0, 0x118}, @unspec=@AUDIT={0x28, 'AUDIT\x00'}}, {{@arp={@dev={0xac, 0x14, 0x14}, @broadcast=0xffffffff, 0x0, 0x0, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, @mac=@link_local={0x1, 0x80, 0xc2}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz_tun\x00', 'veth0_to_team\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @multicast1=0xe0000001, @multicast1=0xe0000001}}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4d0) 19:33:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000180), 0x10) 19:33:41 executing program 7: memfd_create(&(0x7f00000000c0)='/dev/zero\x00', 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={{0x77359400}}) 19:33:41 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket$inet6(0xa, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000000)) 19:33:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', '\x00'}) lchown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 19:33:41 executing program 7: memfd_create(&(0x7f00000000c0)='/dev/zero\x00', 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={{0x77359400}}) 19:33:41 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket(0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) 19:33:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000180), 0x10) 19:33:41 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000000)) 19:33:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) sysinfo(&(0x7f0000000180)=""/214) prctl$setname(0xf, &(0x7f00000000c0)='/dev/zero\x00') [ 836.904807] audit: type=1326 audit(1529696021.903:1803): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19993 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:41 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) memfd_create(&(0x7f00000000c0)='/dev/zero\x00', 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={{0x77359400}}) 19:33:41 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 19:33:41 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket(0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) 19:33:41 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x480, 0x0, 0x140, 0x258, 0x398, 0x398, 0x398, 0x4, &(0x7f00000000c0), {[{{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @empty, @local={0xac, 0x14, 0x14, 0xaa}}}}, {{@uncond, 0xf0, 0x118}, @unspec=@AUDIT={0x28, 'AUDIT\x00'}}, {{@arp={@dev={0xac, 0x14, 0x14}, @broadcast=0xffffffff, 0x0, 0x0, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, @mac=@link_local={0x1, 0x80, 0xc2}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz_tun\x00', 'veth0_to_team\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @multicast1=0xe0000001, @multicast1=0xe0000001}}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4d0) 19:33:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000180), 0x10) 19:33:41 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000000)) 19:33:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', '\x00'}) lchown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 19:33:42 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket(0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) [ 837.079614] audit: type=1326 audit(1529696022.077:1804): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20014 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:42 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) memfd_create(&(0x7f00000000c0)='/dev/zero\x00', 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={{0x77359400}}) 19:33:42 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000000)) 19:33:42 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x480, 0x0, 0x140, 0x258, 0x398, 0x398, 0x398, 0x4, &(0x7f00000000c0), {[{{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @empty, @local={0xac, 0x14, 0x14, 0xaa}}}}, {{@uncond, 0xf0, 0x118}, @unspec=@AUDIT={0x28, 'AUDIT\x00'}}, {{@arp={@dev={0xac, 0x14, 0x14}, @broadcast=0xffffffff, 0x0, 0x0, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, @mac=@link_local={0x1, 0x80, 0xc2}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz_tun\x00', 'veth0_to_team\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @multicast1=0xe0000001, @multicast1=0xe0000001}}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4d0) 19:33:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000180), 0x10) 19:33:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', '\x00'}) lchown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 19:33:42 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket(0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) 19:33:42 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) memfd_create(&(0x7f00000000c0)='/dev/zero\x00', 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={{0x77359400}}) 19:33:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) sysinfo(&(0x7f0000000180)=""/214) prctl$setname(0xf, &(0x7f00000000c0)='/dev/zero\x00') 19:33:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', '\x00'}) lchown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) [ 837.831049] audit: type=1326 audit(1529696022.829:1805): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20055 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:42 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000000)) 19:33:42 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x480, 0x0, 0x140, 0x258, 0x398, 0x398, 0x398, 0x4, &(0x7f00000000c0), {[{{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @empty, @local={0xac, 0x14, 0x14, 0xaa}}}}, {{@uncond, 0xf0, 0x118}, @unspec=@AUDIT={0x28, 'AUDIT\x00'}}, {{@arp={@dev={0xac, 0x14, 0x14}, @broadcast=0xffffffff, 0x0, 0x0, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, @mac=@link_local={0x1, 0x80, 0xc2}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz_tun\x00', 'veth0_to_team\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @multicast1=0xe0000001, @multicast1=0xe0000001}}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4d0) 19:33:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) lchown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 19:33:42 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) memfd_create(&(0x7f00000000c0)='/dev/zero\x00', 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={{0x77359400}}) 19:33:42 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket(0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) 19:33:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000180), 0x10) 19:33:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f00000002c0)={'broute\x00', 0x0, 0x0, 0xeb, [], 0x0, &(0x7f0000000140), &(0x7f00000001c0)=""/235}, &(0x7f0000000340)=0x78) [ 838.011554] audit: type=1326 audit(1529696023.010:1806): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20062 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) memfd_create(&(0x7f00000000c0)='/dev/zero\x00', 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={{0x77359400}}) 19:33:43 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket(0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) 19:33:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x480, 0x0, 0x140, 0x258, 0x398, 0x398, 0x398, 0x4, &(0x7f00000000c0), {[{{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @empty, @local={0xac, 0x14, 0x14, 0xaa}}}}, {{@uncond, 0xf0, 0x118}, @unspec=@AUDIT={0x28, 'AUDIT\x00'}}, {{@arp={@dev={0xac, 0x14, 0x14}, @broadcast=0xffffffff, 0x0, 0x0, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, @mac=@link_local={0x1, 0x80, 0xc2}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz_tun\x00', 'veth0_to_team\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @multicast1=0xe0000001, @multicast1=0xe0000001}}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4d0) 19:33:43 executing program 4: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000180), 0x10) 19:33:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) lchown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 19:33:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) memfd_create(&(0x7f00000000c0)='/dev/zero\x00', 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={{0x77359400}}) 19:33:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f00000002c0)={'broute\x00', 0x0, 0x0, 0xeb, [], 0x0, &(0x7f0000000140), &(0x7f00000001c0)=""/235}, &(0x7f0000000340)=0x78) 19:33:43 executing program 4: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000180), 0x10) 19:33:43 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) socket(0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) 19:33:43 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000000)) 19:33:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x480, 0x0, 0x140, 0x258, 0x398, 0x398, 0x398, 0x4, &(0x7f00000000c0), {[{{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @empty, @local={0xac, 0x14, 0x14, 0xaa}}}}, {{@uncond, 0xf0, 0x118}, @unspec=@AUDIT={0x28, 'AUDIT\x00'}}, {{@arp={@dev={0xac, 0x14, 0x14}, @broadcast=0xffffffff, 0x0, 0x0, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, @mac=@link_local={0x1, 0x80, 0xc2}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz_tun\x00', 'veth0_to_team\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @multicast1=0xe0000001, @multicast1=0xe0000001}}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4d0) 19:33:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) lchown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 19:33:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501cd}]}) memfd_create(&(0x7f00000000c0)='/dev/zero\x00', 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={{0x77359400}}) 19:33:43 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) eventfd(0x0) ppoll(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, &(0x7f00000000c0), 0x8) 19:33:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f00000002c0)={'broute\x00', 0x0, 0x0, 0xeb, [], 0x0, &(0x7f0000000140), &(0x7f00000001c0)=""/235}, &(0x7f0000000340)=0x78) 19:33:43 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) socket(0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) 19:33:43 executing program 4: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000180), 0x10) 19:33:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501cd}]}) memfd_create(&(0x7f00000000c0)='/dev/zero\x00', 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={{0x77359400}}) [ 839.000189] audit: type=1326 audit(1529696023.998:1807): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20130 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:44 executing program 0: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x480, 0x0, 0x140, 0x258, 0x398, 0x398, 0x398, 0x4, &(0x7f00000000c0), {[{{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @empty, @local={0xac, 0x14, 0x14, 0xaa}}}}, {{@uncond, 0xf0, 0x118}, @unspec=@AUDIT={0x28, 'AUDIT\x00'}}, {{@arp={@dev={0xac, 0x14, 0x14}, @broadcast=0xffffffff, 0x0, 0x0, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, @mac=@link_local={0x1, 0x80, 0xc2}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz_tun\x00', 'veth0_to_team\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @multicast1=0xe0000001, @multicast1=0xe0000001}}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4d0) 19:33:44 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000180), 0x10) 19:33:44 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) socket(0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) 19:33:44 executing program 2: lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', '\x00'}) lchown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 19:33:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f00000002c0)={'broute\x00', 0x0, 0x0, 0xeb, [], 0x0, &(0x7f0000000140), &(0x7f00000001c0)=""/235}, &(0x7f0000000340)=0x78) 19:33:44 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000480)) 19:33:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501cd}]}) memfd_create(&(0x7f00000000c0)='/dev/zero\x00', 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={{0x77359400}}) 19:33:44 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000000)) 19:33:44 executing program 0: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x480, 0x0, 0x140, 0x258, 0x398, 0x398, 0x398, 0x4, &(0x7f00000000c0), {[{{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @empty, @local={0xac, 0x14, 0x14, 0xaa}}}}, {{@uncond, 0xf0, 0x118}, @unspec=@AUDIT={0x28, 'AUDIT\x00'}}, {{@arp={@dev={0xac, 0x14, 0x14}, @broadcast=0xffffffff, 0x0, 0x0, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, @mac=@link_local={0x1, 0x80, 0xc2}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz_tun\x00', 'veth0_to_team\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @multicast1=0xe0000001, @multicast1=0xe0000001}}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4d0) 19:33:44 executing program 2: lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', '\x00'}) lchown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 19:33:44 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000180), 0x10) 19:33:44 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket(0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) 19:33:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) memfd_create(&(0x7f00000000c0)='/dev/zero\x00', 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={{0x77359400}}) 19:33:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f00000002c0)={'broute\x00', 0x0, 0x0, 0xeb, [], 0x0, &(0x7f0000000140), &(0x7f00000001c0)=""/235}, &(0x7f0000000340)=0x78) 19:33:44 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000480)) [ 839.940249] audit: type=1326 audit(1529696024.938:1808): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20170 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:45 executing program 2: lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', '\x00'}) lchown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 19:33:45 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000480)) 19:33:45 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000180), 0x10) [ 840.023818] audit: type=1326 audit(1529696024.961:1809): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20166 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:45 executing program 0: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x480, 0x0, 0x140, 0x258, 0x398, 0x398, 0x398, 0x4, &(0x7f00000000c0), {[{{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @empty, @local={0xac, 0x14, 0x14, 0xaa}}}}, {{@uncond, 0xf0, 0x118}, @unspec=@AUDIT={0x28, 'AUDIT\x00'}}, {{@arp={@dev={0xac, 0x14, 0x14}, @broadcast=0xffffffff, 0x0, 0x0, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, @mac=@link_local={0x1, 0x80, 0xc2}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz_tun\x00', 'veth0_to_team\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @multicast1=0xe0000001, @multicast1=0xe0000001}}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4d0) 19:33:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f00000002c0)={'broute\x00', 0x0, 0x0, 0xeb, [], 0x0, &(0x7f0000000140), &(0x7f00000001c0)=""/235}, &(0x7f0000000340)=0x78) 19:33:45 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000480)) 19:33:45 executing program 2: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', '\x00'}) lchown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 19:33:45 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000180), 0x10) 19:33:45 executing program 2: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', '\x00'}) lchown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 19:33:45 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x480, 0x0, 0x140, 0x258, 0x398, 0x398, 0x398, 0x4, &(0x7f00000000c0), {[{{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @empty, @local={0xac, 0x14, 0x14, 0xaa}}}}, {{@uncond, 0xf0, 0x118}, @unspec=@AUDIT={0x28, 'AUDIT\x00'}}, {{@arp={@dev={0xac, 0x14, 0x14}, @broadcast=0xffffffff, 0x0, 0x0, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, @mac=@link_local={0x1, 0x80, 0xc2}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz_tun\x00', 'veth0_to_team\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @multicast1=0xe0000001, @multicast1=0xe0000001}}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4d0) 19:33:45 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket(0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) 19:33:45 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000480)) 19:33:45 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000180), 0x10) 19:33:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) memfd_create(&(0x7f00000000c0)='/dev/zero\x00', 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={{0x77359400}}) 19:33:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f00000002c0)={'broute\x00', 0x0, 0x0, 0xeb, [], 0x0, &(0x7f0000000140), &(0x7f00000001c0)=""/235}, &(0x7f0000000340)=0x78) 19:33:45 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) pkey_alloc(0x0, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) [ 840.942006] kauditd_printk_skb: 1 callbacks suppressed [ 840.942030] audit: type=1326 audit(1529696025.940:1811): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20223 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:46 executing program 2: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', '\x00'}) lchown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 19:33:46 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000180), 0x10) 19:33:46 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x480, 0x0, 0x140, 0x258, 0x398, 0x398, 0x398, 0x4, &(0x7f00000000c0), {[{{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @empty, @local={0xac, 0x14, 0x14, 0xaa}}}}, {{@uncond, 0xf0, 0x118}, @unspec=@AUDIT={0x28, 'AUDIT\x00'}}, {{@arp={@dev={0xac, 0x14, 0x14}, @broadcast=0xffffffff, 0x0, 0x0, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, @mac=@link_local={0x1, 0x80, 0xc2}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz_tun\x00', 'veth0_to_team\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @multicast1=0xe0000001, @multicast1=0xe0000001}}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4d0) [ 841.009331] audit: type=1326 audit(1529696025.976:1812): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20218 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:46 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000480)) 19:33:46 executing program 3: accept4$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f00000002c0)={'broute\x00', 0x0, 0x0, 0xeb, [], 0x0, &(0x7f0000000140), &(0x7f00000001c0)=""/235}, &(0x7f0000000340)=0x78) 19:33:46 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) pkey_alloc(0x0, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) 19:33:46 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fe}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000180), 0x10) 19:33:46 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x480, 0x0, 0x140, 0x258, 0x398, 0x398, 0x398, 0x4, &(0x7f00000000c0), {[{{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @empty, @local={0xac, 0x14, 0x14, 0xaa}}}}, {{@uncond, 0xf0, 0x118}, @unspec=@AUDIT={0x28, 'AUDIT\x00'}}, {{@arp={@dev={0xac, 0x14, 0x14}, @broadcast=0xffffffff, 0x0, 0x0, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, @mac=@link_local={0x1, 0x80, 0xc2}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz_tun\x00', 'veth0_to_team\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @multicast1=0xe0000001, @multicast1=0xe0000001}}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4d0) 19:33:46 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', '\x00'}) lchown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 19:33:46 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000480)) 19:33:46 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket(0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) 19:33:46 executing program 3: accept4$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f00000002c0)={'broute\x00', 0x0, 0x0, 0xeb, [], 0x0, &(0x7f0000000140), &(0x7f00000001c0)=""/235}, &(0x7f0000000340)=0x78) 19:33:46 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fe}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000180), 0x10) 19:33:46 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x480, 0x0, 0x140, 0x258, 0x398, 0x398, 0x398, 0x4, &(0x7f00000000c0), {[{{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @empty, @local={0xac, 0x14, 0x14, 0xaa}}}}, {{@uncond, 0xf0, 0x118}, @unspec=@AUDIT={0x28, 'AUDIT\x00'}}, {{@arp={@dev={0xac, 0x14, 0x14}, @broadcast=0xffffffff, 0x0, 0x0, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, @mac=@link_local={0x1, 0x80, 0xc2}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz_tun\x00', 'veth0_to_team\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @multicast1=0xe0000001, @multicast1=0xe0000001}}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4d0) 19:33:46 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) pkey_alloc(0x0, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) 19:33:46 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', '\x00'}) lchown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 19:33:46 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000480)) 19:33:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) memfd_create(&(0x7f00000000c0)='/dev/zero\x00', 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={{0x77359400}}) [ 841.934429] audit: type=1326 audit(1529696026.933:1813): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20284 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:47 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000480)) 19:33:47 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fe}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000180), 0x10) [ 842.002520] audit: type=1326 audit(1529696026.958:1814): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20285 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', '\x00'}) lchown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 19:33:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x480, 0x0, 0x140, 0x258, 0x398, 0x398, 0x398, 0x4, &(0x7f00000000c0), {[{{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @empty, @local={0xac, 0x14, 0x14, 0xaa}}}}, {{@uncond, 0xf0, 0x118}, @unspec=@AUDIT={0x28, 'AUDIT\x00'}}, {{@arp={@dev={0xac, 0x14, 0x14}, @broadcast=0xffffffff, 0x0, 0x0, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, @mac=@link_local={0x1, 0x80, 0xc2}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz_tun\x00', 'veth0_to_team\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @multicast1=0xe0000001, @multicast1=0xe0000001}}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4d0) 19:33:47 executing program 3: accept4$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f00000002c0)={'broute\x00', 0x0, 0x0, 0xeb, [], 0x0, &(0x7f0000000140), &(0x7f00000001c0)=""/235}, &(0x7f0000000340)=0x78) 19:33:47 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) pkey_alloc(0x0, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) 19:33:47 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000180), 0x10) 19:33:47 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000480)) [ 842.335975] audit: type=1326 audit(1529696027.334:1815): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20312 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:47 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) eventfd(0x0) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f0000000040)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}) 19:33:47 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f00000002c0)={'broute\x00', 0x0, 0x0, 0xeb, [], 0x0, &(0x7f0000000140), &(0x7f00000001c0)=""/235}, &(0x7f0000000340)=0x78) 19:33:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', '\x00'}) lchown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 19:33:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x480, 0x0, 0x140, 0x258, 0x398, 0x398, 0x398, 0x4, &(0x7f00000000c0), {[{{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @empty, @local={0xac, 0x14, 0x14, 0xaa}}}}, {{@uncond, 0xf0, 0x118}, @unspec=@AUDIT={0x28, 'AUDIT\x00'}}, {{@arp={@dev={0xac, 0x14, 0x14}, @broadcast=0xffffffff, 0x0, 0x0, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, @mac=@link_local={0x1, 0x80, 0xc2}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz_tun\x00', 'veth0_to_team\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @multicast1=0xe0000001, @multicast1=0xe0000001}}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4d0) 19:33:47 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) pkey_alloc(0x0, 0x0) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000080)) 19:33:47 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) 19:33:47 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000480)) 19:33:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', '\x00'}) lchown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 19:33:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x480, 0x0, 0x140, 0x258, 0x398, 0x398, 0x398, 0x4, &(0x7f00000000c0), {[{{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @empty, @local={0xac, 0x14, 0x14, 0xaa}}}}, {{@uncond, 0xf0, 0x118}, @unspec=@AUDIT={0x28, 'AUDIT\x00'}}, {{@arp={@dev={0xac, 0x14, 0x14}, @broadcast=0xffffffff, 0x0, 0x0, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, @mac=@link_local={0x1, 0x80, 0xc2}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz_tun\x00', 'veth0_to_team\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @multicast1=0xe0000001, @multicast1=0xe0000001}}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4d0) 19:33:48 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f00000002c0)={'broute\x00', 0x0, 0x0, 0xeb, [], 0x0, &(0x7f0000000140), &(0x7f00000001c0)=""/235}, &(0x7f0000000340)=0x78) 19:33:48 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000480)) 19:33:48 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) 19:33:48 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) eventfd(0x0) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f0000000040)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}) 19:33:48 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) pkey_alloc(0x0, 0x0) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000080)) 19:33:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000180), 0x10) 19:33:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', '\x00'}) lchown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 19:33:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x480, 0x0, 0x140, 0x258, 0x398, 0x398, 0x398, 0x4, &(0x7f00000000c0), {[{{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @empty, @local={0xac, 0x14, 0x14, 0xaa}}}}, {{@uncond, 0xf0, 0x118}, @unspec=@AUDIT={0x28, 'AUDIT\x00'}}, {{@arp={@dev={0xac, 0x14, 0x14}, @broadcast=0xffffffff, 0x0, 0x0, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, @mac=@link_local={0x1, 0x80, 0xc2}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz_tun\x00', 'veth0_to_team\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @multicast1=0xe0000001, @multicast1=0xe0000001}}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4d0) 19:33:48 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000480)) 19:33:48 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f00000002c0)={'broute\x00', 0x0, 0x0, 0xeb, [], 0x0, &(0x7f0000000140), &(0x7f00000001c0)=""/235}, &(0x7f0000000340)=0x78) 19:33:48 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) 19:33:48 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) eventfd(0x0) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f0000000040)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}) [ 843.409664] audit: type=1326 audit(1529696028.408:1816): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20377 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:48 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000480)) 19:33:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x480, 0x0, 0x140, 0x258, 0x398, 0x398, 0x398, 0x4, &(0x7f00000000c0), {[{{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @empty, @local={0xac, 0x14, 0x14, 0xaa}}}}, {{@uncond, 0xf0, 0x118}, @unspec=@AUDIT={0x28, 'AUDIT\x00'}}, {{@arp={@dev={0xac, 0x14, 0x14}, @broadcast=0xffffffff, 0x0, 0x0, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, @mac=@link_local={0x1, 0x80, 0xc2}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz_tun\x00', 'veth0_to_team\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @multicast1=0xe0000001, @multicast1=0xe0000001}}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4d0) 19:33:48 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) pkey_alloc(0x0, 0x0) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000080)) 19:33:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f00000002c0)={'broute\x00', 0x0, 0x0, 0xeb, [], 0x0, &(0x7f0000000140), &(0x7f00000001c0)=""/235}, &(0x7f0000000340)=0x78) 19:33:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', '\x00'}) lchown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 19:33:48 executing program 5: pkey_alloc(0x0, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) [ 843.605993] audit: type=1326 audit(1529696028.604:1817): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20388 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:48 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) eventfd(0x0) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f0000000040)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}) 19:33:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f00000002c0)={'broute\x00', 0x0, 0x0, 0xeb, [], 0x0, &(0x7f0000000140), &(0x7f00000001c0)=""/235}, &(0x7f0000000340)=0x78) 19:33:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x480, 0x0, 0x140, 0x258, 0x398, 0x398, 0x398, 0x4, &(0x7f00000000c0), {[{{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @empty, @local={0xac, 0x14, 0x14, 0xaa}}}}, {{@uncond, 0xf0, 0x118}, @unspec=@AUDIT={0x28, 'AUDIT\x00'}}, {{@arp={@dev={0xac, 0x14, 0x14}, @broadcast=0xffffffff, 0x0, 0x0, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, @mac=@link_local={0x1, 0x80, 0xc2}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz_tun\x00', 'veth0_to_team\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @multicast1=0xe0000001, @multicast1=0xe0000001}}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4d0) [ 843.816222] audit: type=1326 audit(1529696028.814:1818): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20409 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:49 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000180), 0x10) 19:33:49 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000480)) 19:33:49 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) pkey_alloc(0x0, 0x0) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000080)) 19:33:49 executing program 5: pkey_alloc(0x0, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) 19:33:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f0000000040)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}) 19:33:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f00000002c0)={'broute\x00', 0x0, 0x0, 0xeb, [], 0x0, &(0x7f0000000140), &(0x7f00000001c0)=""/235}, &(0x7f0000000340)=0x78) 19:33:49 executing program 5: pkey_alloc(0x0, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) [ 844.380171] audit: type=1326 audit(1529696029.378:1819): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20425 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:49 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000480)) 19:33:49 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000080)) 19:33:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fe}]}) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f00000002c0)={'broute\x00', 0x0, 0x0, 0xeb, [], 0x0, &(0x7f0000000140), &(0x7f00000001c0)=""/235}, &(0x7f0000000340)=0x78) 19:33:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f0000000040)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}) 19:33:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', '\x00'}) lchown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 19:33:49 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000480)) 19:33:49 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) pkey_alloc(0x0, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) 19:33:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fe}]}) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f00000002c0)={'broute\x00', 0x0, 0x0, 0xeb, [], 0x0, &(0x7f0000000140), &(0x7f00000001c0)=""/235}, &(0x7f0000000340)=0x78) [ 844.636025] audit: type=1326 audit(1529696029.634:1820): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20446 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x480, 0x0, 0x140, 0x258, 0x398, 0x398, 0x398, 0x4, &(0x7f00000000c0), {[{{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @empty, @local={0xac, 0x14, 0x14, 0xaa}}}}, {{@uncond, 0xf0, 0x118}, @unspec=@AUDIT={0x28, 'AUDIT\x00'}}, {{@arp={@dev={0xac, 0x14, 0x14}, @broadcast=0xffffffff, 0x0, 0x0, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, @mac=@link_local={0x1, 0x80, 0xc2}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz_tun\x00', 'veth0_to_team\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @multicast1=0xe0000001, @multicast1=0xe0000001}}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4d0) 19:33:50 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f0000000040)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}) 19:33:50 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000080)) 19:33:50 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000480)) 19:33:50 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) pkey_alloc(0x0, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) 19:33:50 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) stat(&(0x7f0000000780)='./file0\x00', &(0x7f0000000040)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d00)={'tunl0\x00'}) 19:33:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fe}]}) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f00000002c0)={'broute\x00', 0x0, 0x0, 0xeb, [], 0x0, &(0x7f0000000140), &(0x7f00000001c0)=""/235}, &(0x7f0000000340)=0x78) 19:33:50 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000480)) 19:33:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f00000002c0)={'broute\x00', 0x0, 0x0, 0xeb, [], 0x0, &(0x7f0000000140), &(0x7f00000001c0)=""/235}, &(0x7f0000000340)=0x78) 19:33:50 executing program 7: eventfd(0x0) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f0000000040)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}) 19:33:50 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) pkey_alloc(0x0, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) 19:33:50 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000080)) 19:33:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', '\x00'}) lchown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 19:33:50 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) stat(&(0x7f0000000780)='./file0\x00', &(0x7f0000000040)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d00)={'tunl0\x00'}) 19:33:50 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000480)) 19:33:50 executing program 7: eventfd(0x0) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f0000000040)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}) 19:33:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x480, 0x0, 0x140, 0x258, 0x398, 0x398, 0x398, 0x4, &(0x7f00000000c0), {[{{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @empty, @local={0xac, 0x14, 0x14, 0xaa}}}}, {{@uncond, 0xf0, 0x118}, @unspec=@AUDIT={0x28, 'AUDIT\x00'}}, {{@arp={@dev={0xac, 0x14, 0x14}, @broadcast=0xffffffff, 0x0, 0x0, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, @mac=@link_local={0x1, 0x80, 0xc2}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz_tun\x00', 'veth0_to_team\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @multicast1=0xe0000001, @multicast1=0xe0000001}}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4d0) 19:33:50 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) pkey_alloc(0x0, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) 19:33:50 executing program 1: pkey_alloc(0x0, 0x0) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000080)) 19:33:50 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) stat(&(0x7f0000000780)='./file0\x00', &(0x7f0000000040)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d00)={'tunl0\x00'}) 19:33:50 executing program 7: eventfd(0x0) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f0000000040)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}) 19:33:50 executing program 1: pkey_alloc(0x0, 0x0) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000080)) 19:33:50 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) pkey_alloc(0x0, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) 19:33:50 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) eventfd(0x0) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f0000000040)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}) 19:33:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f00000002c0)={'broute\x00', 0x0, 0x0, 0xeb, [], 0x0, &(0x7f0000000140), &(0x7f00000001c0)=""/235}, &(0x7f0000000340)=0x78) 19:33:51 executing program 1: pkey_alloc(0x0, 0x0) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000080)) 19:33:51 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) stat(&(0x7f0000000780)='./file0\x00', &(0x7f0000000040)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d00)={'tunl0\x00'}) 19:33:51 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) eventfd(0x0) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f0000000040)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}) [ 846.439968] kauditd_printk_skb: 5 callbacks suppressed [ 846.439988] audit: type=1326 audit(1529696031.438:1826): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20546 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:51 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000480)) 19:33:51 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) pkey_alloc(0x0, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) 19:33:51 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) pkey_alloc(0x0, 0x0) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000080)) 19:33:51 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) eventfd(0x0) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f0000000040)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}) [ 846.622681] audit: type=1326 audit(1529696031.621:1827): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20556 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:51 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) eventfd(0x0) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f0000000040)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}) 19:33:51 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') 19:33:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 19:33:51 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d00)={'tunl0\x00'}) 19:33:51 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) pkey_alloc(0x0, 0x0) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000080)) 19:33:51 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) pkey_alloc(0x0, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) 19:33:51 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) eventfd(0x0) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f0000000040)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}) 19:33:51 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) pkey_alloc(0x0, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) 19:33:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000280)=0xe8) 19:33:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f00000002c0)={'broute\x00', 0x0, 0x0, 0xeb, [], 0x0, &(0x7f0000000140), &(0x7f00000001c0)=""/235}, &(0x7f0000000340)=0x78) 19:33:52 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) pkey_alloc(0x0, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) 19:33:52 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') [ 847.398001] audit: type=1326 audit(1529696032.396:1828): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20601 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:52 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000480)) 19:33:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) eventfd(0x0) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f0000000040)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}) 19:33:52 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) pkey_alloc(0x0, 0x0) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000080)) 19:33:52 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d00)={'tunl0\x00'}) 19:33:52 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) pkey_alloc(0x0, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) 19:33:52 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') 19:33:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000280)=0xe8) [ 847.577580] audit: type=1326 audit(1529696032.576:1829): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20609 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:52 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) pkey_alloc(0x0, 0x0) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000080)) [ 847.633190] audit: type=1326 audit(1529696032.627:1830): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20615 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:52 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d00)={'tunl0\x00'}) 19:33:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fe}]}) eventfd(0x0) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f0000000040)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}) 19:33:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000280)=0xe8) 19:33:52 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) pkey_alloc(0x0, 0x0) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000080)) 19:33:52 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') 19:33:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fe}]}) eventfd(0x0) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f0000000040)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}) 19:33:53 executing program 4: stat(&(0x7f0000000780)='./file0\x00', &(0x7f0000000040)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d00)={'tunl0\x00'}) 19:33:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000280)=0xe8) 19:33:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) 19:33:53 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) pkey_alloc(0x0, 0x0) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000080)) 19:33:53 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') 19:33:53 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) pkey_alloc(0x0, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) 19:33:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fe}]}) eventfd(0x0) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f0000000040)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}) 19:33:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000280)=0xe8) 19:33:53 executing program 4: stat(&(0x7f0000000780)='./file0\x00', &(0x7f0000000040)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d00)={'tunl0\x00'}) 19:33:53 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000001c0), 0x14) [ 848.563928] audit: type=1326 audit(1529696033.562:1831): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20661 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:53 executing program 4: stat(&(0x7f0000000780)='./file0\x00', &(0x7f0000000040)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d00)={'tunl0\x00'}) 19:33:53 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) pkey_alloc(0x0, 0x0) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000080)) 19:33:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) eventfd(0x0) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f0000000040)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}) 19:33:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) 19:33:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000280)=0xe8) 19:33:53 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') 19:33:53 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000001c0), 0x14) [ 848.838642] audit: type=1326 audit(1529696033.837:1832): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20684 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:53 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) stat(&(0x7f0000000780)='./file0\x00', &(0x7f0000000040)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d00)={'tunl0\x00'}) 19:33:53 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) pkey_alloc(0x0, 0x0) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000080)) 19:33:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000280)=0xe8) 19:33:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) 19:33:54 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') 19:33:54 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) pkey_alloc(0x0, 0x0) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000080)) 19:33:54 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) pkey_alloc(0x0, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) 19:33:54 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) stat(&(0x7f0000000780)='./file0\x00', &(0x7f0000000040)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d00)={'tunl0\x00'}) 19:33:54 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000280)=0xe8) 19:33:54 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000001c0), 0x14) 19:33:54 executing program 0: syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') [ 849.524113] audit: type=1326 audit(1529696034.522:1833): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20728 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) eventfd(0x0) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f0000000040)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}) 19:33:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) 19:33:54 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) pkey_alloc(0x0, 0x0) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000080)) 19:33:54 executing program 0: syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') 19:33:54 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) stat(&(0x7f0000000780)='./file0\x00', &(0x7f0000000040)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d00)={'tunl0\x00'}) 19:33:54 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000280)=0xe8) 19:33:54 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000001c0), 0x14) [ 849.753193] audit: type=1326 audit(1529696034.751:1834): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20740 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:54 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000280)=0xe8) 19:33:54 executing program 0: syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') [ 849.799260] audit: type=1326 audit(1529696034.787:1835): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20749 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:54 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) stat(&(0x7f0000000780)='./file0\x00', &(0x7f0000000040)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d00)={'tunl0\x00'}) 19:33:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) 19:33:55 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') 19:33:55 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000280)=0xe8) 19:33:55 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) stat(&(0x7f0000000780)='./file0\x00', &(0x7f0000000040)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d00)={'tunl0\x00'}) 19:33:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) 19:33:55 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000001c0), 0x14) 19:33:55 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) eventfd(0x0) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f0000000040)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}) 19:33:55 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0xe}}, 0x14}, 0x1}, 0x0) 19:33:55 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000280)=0xe8) 19:33:55 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') 19:33:55 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) stat(&(0x7f0000000780)='./file0\x00', &(0x7f0000000040)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d00)={'tunl0\x00'}) 19:33:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) 19:33:55 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000001c0), 0x14) 19:33:55 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) pkey_alloc(0x0, 0x0) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000080)) 19:33:55 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000280)=0xe8) 19:33:55 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) 19:33:55 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') 19:33:55 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) stat(&(0x7f0000000780)='./file0\x00', &(0x7f0000000040)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d00)={'tunl0\x00'}) 19:33:55 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0xe}}, 0x14}, 0x1}, 0x0) 19:33:55 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000001c0), 0x14) 19:33:56 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000280)=0xe8) 19:33:56 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) 19:33:56 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) pkey_alloc(0x0, 0x0) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000080)) 19:33:56 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') 19:33:56 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) stat(&(0x7f0000000780)='./file0\x00', &(0x7f0000000040)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d00)={'tunl0\x00'}) 19:33:56 executing program 6: fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000001c0), 0x14) 19:33:56 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0xe}}, 0x14}, 0x1}, 0x0) 19:33:56 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000280)=0xe8) 19:33:56 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) 19:33:56 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) wait4(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)) [ 851.748015] kauditd_printk_skb: 2 callbacks suppressed [ 851.748042] audit: type=1326 audit(1529696036.746:1838): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20847 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:56 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') 19:33:56 executing program 6: fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000001c0), 0x14) 19:33:56 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000280)=0xe8) 19:33:56 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) 19:33:56 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) stat(&(0x7f0000000780)='./file0\x00', &(0x7f0000000040)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d00)={'tunl0\x00'}) 19:33:56 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0xe}}, 0x14}, 0x1}, 0x0) 19:33:57 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) wait4(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)) 19:33:57 executing program 6: fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000001c0), 0x14) 19:33:57 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000001c0), 0x14) 19:33:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0xe}}, 0x14}, 0x1}, 0x0) 19:33:57 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) wait4(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)) 19:33:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000280)=0xe8) 19:33:57 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) 19:33:57 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') 19:33:57 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) stat(&(0x7f0000000780)='./file0\x00', &(0x7f0000000040)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d00)={'tunl0\x00'}) 19:33:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) setrlimit(0x0, &(0x7f0000000040)) [ 852.693803] audit: type=1326 audit(1529696037.692:1839): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20891 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000280)=0xe8) 19:33:57 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) 19:33:57 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') 19:33:57 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000001c0), 0x14) 19:33:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) setrlimit(0x0, &(0x7f0000000040)) 19:33:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0xe}}, 0x14}, 0x1}, 0x0) 19:33:57 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) wait4(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)) 19:33:58 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000001c0), 0x14) 19:33:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) 19:33:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000280)=0xe8) 19:33:58 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') 19:33:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0xe}}, 0x14}, 0x1}, 0x0) 19:33:58 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) stat(&(0x7f0000000780)='./file0\x00', &(0x7f0000000040)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d00)={'tunl0\x00'}) 19:33:58 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) wait4(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)) 19:33:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) setrlimit(0x0, &(0x7f0000000040)) 19:33:58 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000001c0), 0x14) 19:33:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000280)=0xe8) 19:33:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) 19:33:58 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') 19:33:58 executing program 5: socket$inet(0x2, 0x0, 0x0) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0xe}}, 0x14}, 0x1}, 0x0) [ 853.647244] audit: type=1326 audit(1529696038.645:1840): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20957 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:58 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000001c0), 0x14) 19:33:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) [ 853.735512] audit: type=1326 audit(1529696038.722:1841): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20968 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:58 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') 19:33:58 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) wait4(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)) 19:33:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) setrlimit(0x0, &(0x7f0000000040)) 19:33:58 executing program 5: socket$inet(0x2, 0x0, 0x0) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0xe}}, 0x14}, 0x1}, 0x0) [ 853.940497] audit: type=1326 audit(1529696038.936:1842): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20980 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:59 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000001c0), 0x14) 19:33:59 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) wait4(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)) 19:33:59 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) stat(&(0x7f0000000780)='./file0\x00', &(0x7f0000000040)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d00)={'tunl0\x00'}) 19:33:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) 19:33:59 executing program 5: socket$inet(0x2, 0x0, 0x0) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0xe}}, 0x14}, 0x1}, 0x0) 19:33:59 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000001c0), 0x14) 19:33:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) setrlimit(0x0, &(0x7f0000000040)) 19:33:59 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)) wait4(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)) 19:33:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000280)=0xe8) [ 854.638293] audit: type=1326 audit(1529696039.636:1843): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21005 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:59 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000001c0), 0x14) 19:33:59 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)) wait4(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)) [ 854.722026] audit: type=1326 audit(1529696039.668:1844): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21007 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:33:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) 19:33:59 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') 19:33:59 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0xe}}, 0x14}, 0x1}, 0x0) 19:33:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) setrlimit(0x0, &(0x7f0000000040)) 19:34:00 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)) wait4(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)) 19:34:00 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000001c0), 0x14) [ 855.001179] audit: type=1326 audit(1529696039.994:1845): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21039 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) 19:34:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000280)=0xe8) 19:34:00 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0xe}}, 0x14}, 0x1}, 0x0) 19:34:00 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={{0x0, 0x2710}, {0x0, 0x2710}}, 0x0) 19:34:00 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) wait4(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)) 19:34:00 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) setrlimit(0x0, &(0x7f0000000040)) 19:34:00 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000001c0), 0x14) 19:34:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) [ 855.604198] audit: type=1326 audit(1529696040.602:1846): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21066 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:00 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) wait4(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)) [ 855.673721] audit: type=1326 audit(1529696040.628:1847): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21062 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:00 executing program 1: socket$inet(0x2, 0x0, 0x0) setrlimit(0x0, &(0x7f0000000040)) 19:34:00 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0xe}}, 0x14}, 0x1}, 0x0) 19:34:00 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') 19:34:00 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) wait4(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)) 19:34:00 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={{0x0, 0x2710}, {0x0, 0x2710}}, 0x0) 19:34:00 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0xe}}, 0x14}, 0x1}, 0x0) 19:34:01 executing program 1: socket$inet(0x2, 0x0, 0x0) setrlimit(0x0, &(0x7f0000000040)) 19:34:01 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) wait4(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)) 19:34:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) 19:34:01 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={{0x0, 0x2710}, {0x0, 0x2710}}, 0x0) 19:34:01 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) wait4(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)) 19:34:01 executing program 1: socket$inet(0x2, 0x0, 0x0) setrlimit(0x0, &(0x7f0000000040)) 19:34:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0xe}}, 0x14}, 0x1}, 0x0) 19:34:01 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000001c0), 0x14) 19:34:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)) 19:34:01 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={{0x0, 0x2710}, {0x0, 0x2710}}, 0x0) 19:34:01 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) wait4(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)) 19:34:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0xe}}, 0x14}, 0x1}, 0x0) 19:34:01 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) wait4(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)) 19:34:01 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) setrlimit(0x0, &(0x7f0000000040)) 19:34:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)) 19:34:01 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) utimensat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={{0x0, 0x2710}, {0x0, 0x2710}}, 0x0) 19:34:01 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) socket$inet6_tcp(0xa, 0x1, 0x0) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) 19:34:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0xe}}, 0x14}, 0x1}, 0x0) 19:34:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) 19:34:02 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) wait4(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)) 19:34:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) utimensat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={{0x0, 0x2710}, {0x0, 0x2710}}, 0x0) 19:34:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)) 19:34:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x10006, 0x0, 0x0, 0x2000000501f8}]}) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) [ 857.506329] kauditd_printk_skb: 4 callbacks suppressed [ 857.506351] audit: type=1326 audit(1529696042.504:1852): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21185 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:02 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000001c0), 0x14) 19:34:02 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) setrlimit(0x0, &(0x7f0000000040)) 19:34:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0xe}}, 0x14}, 0x1}, 0x0) 19:34:02 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) wait4(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)) 19:34:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) utimensat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={{0x0, 0x2710}, {0x0, 0x2710}}, 0x0) 19:34:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)) [ 857.677649] audit: type=1326 audit(1529696042.676:1853): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21203 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x10006, 0x0, 0x0, 0x2000000501f8}]}) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) 19:34:02 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) setrlimit(0x0, &(0x7f0000000040)) 19:34:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0xe}}, 0x14}, 0x1}, 0x0) 19:34:02 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) wait4(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)) 19:34:02 executing program 4: openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={{0x0, 0x2710}, {0x0, 0x2710}}, 0x0) [ 857.997971] audit: type=1326 audit(1529696042.996:1854): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21228 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x10006, 0x0, 0x0, 0x2000000501f8}]}) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) 19:34:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)) 19:34:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) setrlimit(0x0, &(0x7f0000000040)) 19:34:03 executing program 4: openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={{0x0, 0x2710}, {0x0, 0x2710}}, 0x0) 19:34:03 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0xe}}, 0x14}, 0x1}, 0x0) [ 858.447141] audit: type=1326 audit(1529696043.445:1855): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21245 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) setrlimit(0x0, &(0x7f0000000040)) 19:34:03 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 19:34:03 executing program 4: openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={{0x0, 0x2710}, {0x0, 0x2710}}, 0x0) 19:34:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)) 19:34:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x0, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 19:34:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x10006, 0x0, 0x0, 0x2000000501f8}]}) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) 19:34:03 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={{0x0, 0x2710}, {0x0, 0x2710}}, 0x0) 19:34:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)) 19:34:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x10006, 0x0, 0x0, 0x2000000501f8}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) 19:34:03 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) wait4(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)) 19:34:03 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 19:34:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) setrlimit(0x0, &(0x7f0000000040)) 19:34:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x0, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 19:34:03 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={{0x0, 0x2710}, {0x0, 0x2710}}, 0x0) [ 859.000733] audit: type=1326 audit(1529696043.999:1856): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21286 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x0, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 19:34:04 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0xe}}, 0x14}, 0x1}, 0x0) 19:34:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 19:34:04 executing program 2: socket$inet(0x2, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)) 19:34:04 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={{0x0, 0x2710}, {0x0, 0x2710}}, 0x0) 19:34:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x10006, 0x0, 0x0, 0x2000000501f8}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) 19:34:04 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) setrlimit(0x0, &(0x7f0000000040)) 19:34:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x0, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) [ 859.428735] audit: type=1326 audit(1529696044.427:1857): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21324 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={{0x0, 0x2710}, {0x0, 0x2710}}, 0x0) 19:34:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x10006, 0x0, 0x0, 0x2000000501f8}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) 19:34:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 19:34:04 executing program 2: socket$inet(0x2, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)) 19:34:04 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) 19:34:04 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) setrlimit(0x0, &(0x7f0000000040)) 19:34:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={{0x0, 0x2710}, {0x0, 0x2710}}, 0x0) 19:34:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 19:34:04 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) wait4(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)) [ 859.953906] audit: type=1326 audit(1529696044.952:1858): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21361 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0xe}}, 0x14}, 0x1}, 0x0) 19:34:05 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 19:34:05 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) 19:34:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={{0x0, 0x2710}, {0x0, 0x2710}}, 0x0) 19:34:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 19:34:05 executing program 2: socket$inet(0x2, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)) 19:34:05 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) setrlimit(0x0, &(0x7f0000000040)) [ 860.378704] audit: type=1326 audit(1529696045.377:1859): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21383 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:05 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) 19:34:05 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 19:34:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 19:34:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={{0x0, 0x2710}, {0x0, 0x2710}}, 0x0) 19:34:05 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x10006, 0x0, 0x0, 0x2000000501f8}]}) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) 19:34:05 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)) 19:34:05 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) setrlimit(0x0, &(0x7f0000000040)) 19:34:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={{0x0, 0x2710}, {0x0, 0x2710}}, 0x0) 19:34:05 executing program 6: syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x0, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) [ 860.885844] audit: type=1326 audit(1529696045.885:1860): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21411 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={{0x0, 0x2710}, {0x0, 0x2710}}, 0x0) 19:34:06 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000080)={'veth0_to_bond\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) 19:34:06 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 19:34:06 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x10006, 0x0, 0x0, 0x2000000501f8}]}) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) 19:34:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) fcntl$getown(0xffffffffffffff9c, 0x9) waitid(0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000180)) 19:34:06 executing program 6: syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x0, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 19:34:06 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)) 19:34:06 executing program 6: syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x0, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 19:34:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={{0x0, 0x2710}, {0x0, 0x2710}}, 0x0) 19:34:06 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x10006, 0x0, 0x0, 0x2000000501f8}]}) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) 19:34:06 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)) 19:34:06 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 19:34:06 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000080)={'veth0_to_bond\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) [ 861.497896] audit: type=1326 audit(1529696046.496:1861): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21449 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) setrlimit(0x0, &(0x7f0000000040)) 19:34:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) fcntl$getown(0xffffffffffffff9c, 0x9) waitid(0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000180)) 19:34:06 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x0, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 19:34:06 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000480)={0x0, &(0x7f0000000080)}) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) 19:34:06 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 19:34:06 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000080)={'veth0_to_bond\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) 19:34:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)) 19:34:06 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000480)={0x0, &(0x7f0000000080)}) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) 19:34:06 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 19:34:07 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000080)={'veth0_to_bond\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) 19:34:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)) 19:34:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={{0x0, 0x2710}, {0x0, 0x2710}}, 0x0) 19:34:07 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x0, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 19:34:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) fcntl$getown(0xffffffffffffff9c, 0x9) waitid(0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000180)) 19:34:07 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 19:34:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000480)={0x0, &(0x7f0000000080)}) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) 19:34:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) setrlimit(0x0, &(0x7f0000000040)) 19:34:07 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) fanotify_init(0x0, 0x0) 19:34:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)) 19:34:07 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x0, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 19:34:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) 19:34:07 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 19:34:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) fcntl$getown(0xffffffffffffff9c, 0x9) waitid(0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000180)) 19:34:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) [ 862.844499] kauditd_printk_skb: 2 callbacks suppressed [ 862.844521] audit: type=1326 audit(1529696047.843:1864): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21541 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x0, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 19:34:07 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 19:34:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) waitid(0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000180)) 19:34:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={{0x0, 0x2710}, {0x0, 0x2710}}, 0x0) 19:34:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) fanotify_init(0x0, 0x0) 19:34:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)) 19:34:08 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) 19:34:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x0, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) [ 863.408348] audit: type=1326 audit(1529696048.405:1865): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21571 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x0, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 19:34:08 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 19:34:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) waitid(0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000180)) 19:34:08 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x10006}]}) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) 19:34:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)) 19:34:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) fanotify_init(0x0, 0x0) 19:34:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)}) [ 863.775254] audit: type=1326 audit(1529696048.773:1866): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21584 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) fanotify_init(0x0, 0x0) 19:34:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x0, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 19:34:08 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 19:34:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) waitid(0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000180)) 19:34:09 executing program 5: fcntl$getown(0xffffffffffffff9c, 0x9) waitid(0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000180)) 19:34:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)) 19:34:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)}) 19:34:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x0, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 19:34:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) fanotify_init(0x0, 0x0) 19:34:09 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 19:34:09 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(0xffffffffffffffff, 0x40a85323, &(0x7f0000000180)={{}, 'port1\x00'}) 19:34:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x0, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 19:34:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) fanotify_init(0x0, 0x0) 19:34:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x10006}]}) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) 19:34:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)}) 19:34:09 executing program 5: fcntl$getown(0xffffffffffffff9c, 0x9) waitid(0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000180)) 19:34:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)) 19:34:09 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000440)=ANY=[]}, 0x1}, 0x0) 19:34:09 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 19:34:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x0, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) [ 864.734911] audit: type=1326 audit(1529696049.733:1867): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21652 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:09 executing program 5: fcntl$getown(0xffffffffffffff9c, 0x9) waitid(0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000180)) [ 864.827902] audit: type=1326 audit(1529696049.761:1868): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21653 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 864.847722] audit: type=1326 audit(1529696049.779:1869): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21663 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:09 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 19:34:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)}) 19:34:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) fanotify_init(0x0, 0x0) 19:34:10 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000440)=ANY=[]}, 0x1}, 0x0) 19:34:10 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 19:34:10 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) fcntl$getown(0xffffffffffffff9c, 0x9) waitid(0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000180)) 19:34:10 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)}) 19:34:10 executing program 7: getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) fanotify_init(0x0, 0x0) 19:34:10 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x10006}]}) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) 19:34:10 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000440)=ANY=[]}, 0x1}, 0x0) 19:34:10 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 19:34:10 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) fcntl$getown(0xffffffffffffff9c, 0x9) waitid(0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000180)) 19:34:10 executing program 7: getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) fanotify_init(0x0, 0x0) 19:34:10 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)}) 19:34:10 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x0, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 19:34:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)) [ 865.734016] audit: type=1326 audit(1529696050.732:1870): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21703 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 865.802681] audit: type=1326 audit(1529696050.755:1871): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21713 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 865.822644] audit: type=1326 audit(1529696050.756:1872): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21707 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:10 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) fcntl$getown(0xffffffffffffff9c, 0x9) waitid(0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000180)) 19:34:10 executing program 7: getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) fanotify_init(0x0, 0x0) 19:34:10 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)}) [ 865.843528] audit: type=1326 audit(1529696050.761:1873): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21709 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:11 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) fcntl$getown(0xffffffffffffff9c, 0x9) waitid(0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000180)) 19:34:11 executing program 7: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) fanotify_init(0x0, 0x0) 19:34:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000440)=ANY=[]}, 0x1}, 0x0) 19:34:11 executing program 1: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)}) 19:34:11 executing program 7: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) fanotify_init(0x0, 0x0) 19:34:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)) 19:34:11 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) fcntl$getown(0xffffffffffffff9c, 0x9) waitid(0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000180)) 19:34:11 executing program 1: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)}) 19:34:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000440)=ANY=[]}, 0x1}, 0x0) 19:34:11 executing program 7: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) fanotify_init(0x0, 0x0) 19:34:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x0, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 19:34:11 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 19:34:11 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x10006, 0x0, 0x0, 0x2000000501f8}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000200)) 19:34:11 executing program 1: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)}) 19:34:11 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) fcntl$getown(0xffffffffffffff9c, 0x9) waitid(0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000180)) 19:34:11 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) fanotify_init(0x0, 0x0) 19:34:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000440)=ANY=[]}, 0x1}, 0x0) 19:34:11 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x10006, 0x0, 0x0, 0x2000000501f8}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000200)) 19:34:11 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) fcntl$getown(0xffffffffffffff9c, 0x9) waitid(0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000180)) 19:34:12 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)}) 19:34:12 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) fanotify_init(0x0, 0x0) 19:34:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) fcntl$getown(0xffffffffffffff9c, 0x9) waitid(0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000180)) 19:34:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000440)=ANY=[]}, 0x1}, 0x0) 19:34:12 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)}) 19:34:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) 19:34:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x10006, 0x0, 0x0, 0x2000000501f8}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000200)) 19:34:12 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) fanotify_init(0x0, 0x0) 19:34:12 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 19:34:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)={'syz1'}, 0x4) 19:34:12 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)}) 19:34:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) fcntl$getown(0xffffffffffffff9c, 0x9) waitid(0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000180)) 19:34:12 executing program 4: socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000440)=ANY=[]}, 0x1}, 0x0) 19:34:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x10006, 0x0, 0x0, 0x2000000501f8}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000200)) 19:34:12 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) fanotify_init(0x0, 0x0) 19:34:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) 19:34:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)}) 19:34:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000000c0), 0x4) 19:34:13 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) fcntl$getown(0xffffffffffffff9c, 0x9) waitid(0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000180)) 19:34:13 executing program 4: socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000440)=ANY=[]}, 0x1}, 0x0) [ 868.119834] kauditd_printk_skb: 4 callbacks suppressed [ 868.119858] audit: type=1326 audit(1529696053.118:1878): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21849 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) fanotify_init(0x0, 0x0) 19:34:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x10006, 0x0, 0x0, 0x2000000501f8}]}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000200)) 19:34:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) 19:34:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)}) 19:34:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) 19:34:13 executing program 4: socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000440)=ANY=[]}, 0x1}, 0x0) 19:34:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) fanotify_init(0x0, 0x0) 19:34:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x10006, 0x0, 0x0, 0x2000000501f8}]}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000200)) 19:34:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)}) 19:34:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000000c0), 0x4) 19:34:13 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) execveat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x0) 19:34:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) fanotify_init(0x0, 0x0) 19:34:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)}) 19:34:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x10006, 0x0, 0x0, 0x2000000501f8}]}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000200)) [ 868.937836] audit: type=1326 audit(1529696053.936:1879): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21897 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:14 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) fcntl$getown(0xffffffffffffff9c, 0x9) waitid(0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000180)) 19:34:14 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000440)=ANY=[]}, 0x1}, 0x0) 19:34:14 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000000c0), 0x4) 19:34:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) 19:34:14 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) execveat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x0) 19:34:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)}) 19:34:14 executing program 0: openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000200)) [ 869.112589] audit: type=1326 audit(1529696054.111:1880): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21920 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:14 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000440)=ANY=[]}, 0x1}, 0x0) 19:34:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) 19:34:14 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000000c0), 0x4) 19:34:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)}) 19:34:14 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) execveat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x0) 19:34:14 executing program 0: openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000200)) 19:34:14 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) fanotify_init(0x0, 0x0) 19:34:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) 19:34:14 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000440)=ANY=[]}, 0x1}, 0x0) [ 869.853040] audit: type=1326 audit(1529696054.851:1881): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21959 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)}) 19:34:15 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000440)=ANY=[]}, 0x1}, 0x0) 19:34:15 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) fcntl$getown(0xffffffffffffff9c, 0x9) waitid(0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000180)) 19:34:15 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) execveat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x0) 19:34:15 executing program 0: openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000200)) 19:34:15 executing program 2: socket$inet(0x2, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) 19:34:15 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000000c0), 0x4) [ 870.054950] audit: type=1326 audit(1529696055.053:1882): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21967 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 870.099974] audit: type=1326 audit(1529696055.085:1883): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21979 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:15 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x10006, 0x0, 0x0, 0x2000000501f8}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000200)) 19:34:15 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000440)=ANY=[]}, 0x1}, 0x0) 19:34:15 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) execveat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x0) 19:34:15 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000000c0), 0x4) 19:34:15 executing program 2: socket$inet(0x2, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) 19:34:15 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x10006, 0x0, 0x0, 0x2000000501f8}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000200)) 19:34:15 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) fanotify_init(0x0, 0x0) 19:34:15 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000000c0), 0x4) 19:34:15 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) execveat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x0) [ 870.798205] audit: type=1326 audit(1529696055.796:1884): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22014 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)}) 19:34:15 executing program 6: socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000000c0), 0x4) 19:34:15 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000440)=ANY=[]}, 0x1}, 0x0) 19:34:15 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x10006, 0x0, 0x0, 0x2000000501f8}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000200)) 19:34:15 executing program 2: socket$inet(0x2, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) 19:34:15 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) execveat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x0) 19:34:15 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000180)) [ 870.978811] audit: type=1326 audit(1529696055.977:1885): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22021 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:16 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000480)={0x0, &(0x7f0000000080)}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000200)) 19:34:16 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)) execveat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x0) 19:34:16 executing program 6: socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000000c0), 0x4) 19:34:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000440)=ANY=[]}, 0x1}, 0x0) 19:34:16 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) 19:34:16 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000180)) 19:34:16 executing program 6: socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000000c0), 0x4) 19:34:16 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000480)={0x0, &(0x7f0000000080)}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000200)) 19:34:16 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)) execveat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x0) 19:34:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)}) 19:34:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000440)=ANY=[]}, 0x1}, 0x0) 19:34:16 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) 19:34:16 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000180)) 19:34:16 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000001c00)={@ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @loopback={0x0, 0x1}}) 19:34:16 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000000c0), 0x4) 19:34:16 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000480)={0x0, &(0x7f0000000080)}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000200)) 19:34:16 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)) execveat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x0) [ 871.991494] audit: type=1326 audit(1529696056.990:1886): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22099 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:17 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) execveat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x0) 19:34:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000200)) 19:34:17 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000000c0), 0x4) 19:34:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000440)=ANY=[]}, 0x1}, 0x0) 19:34:17 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000180)) 19:34:17 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) 19:34:17 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000001c00)={@ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @loopback={0x0, 0x1}}) 19:34:17 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) execveat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x0) 19:34:17 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000180)) 19:34:17 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000000c0), 0x4) 19:34:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000200)) 19:34:17 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000001c00)={@ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @loopback={0x0, 0x1}}) 19:34:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000440)=ANY=[]}, 0x1}, 0x0) 19:34:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000300)=""/48, &(0x7f00000004c0)=0x30) 19:34:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) 19:34:17 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) execveat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x0) [ 872.916118] audit: type=1326 audit(1529696057.914:1887): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22141 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:18 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000200)) 19:34:18 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) execveat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x0) 19:34:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000000c0), 0x4) 19:34:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000180)) 19:34:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000001c00)={@ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @loopback={0x0, 0x1}}) 19:34:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) 19:34:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000300)=""/48, &(0x7f00000004c0)=0x30) 19:34:18 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x10006}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000200)) 19:34:18 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) execveat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x0) 19:34:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000000c0), 0x4) [ 873.342174] audit: type=1326 audit(1529696058.340:1888): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22185 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000180)) 19:34:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000001c00)={@ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @loopback={0x0, 0x1}}) 19:34:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) 19:34:18 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000440)=ANY=[]}, 0x1}, 0x0) 19:34:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000000c0), 0x4) 19:34:18 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) execveat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x0) 19:34:18 executing program 5: socket$inet(0x2, 0x0, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000180)) 19:34:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000001c00)={@ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @loopback={0x0, 0x1}}) 19:34:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000300)=""/48, &(0x7f00000004c0)=0x30) [ 873.922846] audit: type=1326 audit(1529696058.921:1889): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22225 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:18 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) execveat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x0) 19:34:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000000c0), 0x4) 19:34:19 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000001c00)={@ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @loopback={0x0, 0x1}}) 19:34:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000300)=""/48, &(0x7f00000004c0)=0x30) 19:34:19 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x10006}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000200)) 19:34:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) 19:34:19 executing program 5: socket$inet(0x2, 0x0, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000180)) 19:34:19 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) execveat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x0) 19:34:19 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000000c0), 0x4) 19:34:19 executing program 7: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000001c00)={@ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @loopback={0x0, 0x1}}) [ 874.341934] audit: type=1326 audit(1529696059.340:1890): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22260 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:19 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000440)=ANY=[]}, 0x1}, 0x0) 19:34:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000300)=""/48, &(0x7f00000004c0)=0x30) 19:34:19 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) execveat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x0) 19:34:19 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000000c0), 0x4) 19:34:19 executing program 7: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000001c00)={@ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @loopback={0x0, 0x1}}) 19:34:19 executing program 5: socket$inet(0x2, 0x0, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000180)) 19:34:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) 19:34:19 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) execveat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x0) [ 874.908480] audit: type=1326 audit(1529696059.907:1891): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22289 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:19 executing program 7: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000001c00)={@ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @loopback={0x0, 0x1}}) 19:34:20 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000000c0), 0x4) [ 875.010350] audit: type=1326 audit(1529696060.008:1892): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22294 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 875.102041] audit: type=1326 audit(1529696060.086:1893): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22300 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x10006}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000200)) 19:34:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000300)=""/48, &(0x7f00000004c0)=0x30) 19:34:20 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000180)) 19:34:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) 19:34:20 executing program 7: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000001c00)={@ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @loopback={0x0, 0x1}}) 19:34:20 executing program 7: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000001c00)={@ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @loopback={0x0, 0x1}}) [ 875.319466] audit: type=1326 audit(1529696060.318:1894): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22318 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:20 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000180)) 19:34:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000300)=""/48, &(0x7f00000004c0)=0x30) 19:34:20 executing program 7: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000001c00)={@ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @loopback={0x0, 0x1}}) 19:34:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) 19:34:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) getrandom(&(0x7f0000000040)=""/1, 0x1, 0x0) [ 875.841224] audit: type=1326 audit(1529696060.839:1895): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22332 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:20 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000001c00)={@ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @loopback={0x0, 0x1}}) 19:34:20 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) execveat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x0) 19:34:20 executing program 1: socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000300)=""/48, &(0x7f00000004c0)=0x30) 19:34:21 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000180)) 19:34:21 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000000c0), 0x4) [ 876.070692] audit: type=1326 audit(1529696061.069:1896): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22353 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 876.181236] audit: type=1326 audit(1529696061.179:1897): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22365 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000180)) 19:34:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) getrandom(&(0x7f0000000040)=""/1, 0x1, 0x0) 19:34:21 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000001c00)={@ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @loopback={0x0, 0x1}}) 19:34:21 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) 19:34:21 executing program 1: socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000300)=""/48, &(0x7f00000004c0)=0x30) 19:34:21 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000001c00)={@ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @loopback={0x0, 0x1}}) 19:34:21 executing program 1: socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000300)=""/48, &(0x7f00000004c0)=0x30) 19:34:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) getrandom(&(0x7f0000000040)=""/1, 0x1, 0x0) 19:34:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000180)) 19:34:21 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000001c00)={@ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @loopback={0x0, 0x1}}) 19:34:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) 19:34:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000180)) 19:34:21 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) execveat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x0) 19:34:21 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000300)=""/48, &(0x7f00000004c0)=0x30) 19:34:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) getrandom(&(0x7f0000000040)=""/1, 0x1, 0x0) 19:34:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000000c0), 0x4) 19:34:22 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) 19:34:22 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000001c00)={@ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @loopback={0x0, 0x1}}) 19:34:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000180)) 19:34:22 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000300)=""/48, &(0x7f00000004c0)=0x30) 19:34:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) getrandom(&(0x7f0000000040)=""/1, 0x1, 0x0) 19:34:22 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000001c00)={@ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @loopback={0x0, 0x1}}) 19:34:22 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000300)=""/48, &(0x7f00000004c0)=0x30) 19:34:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) getrandom(&(0x7f0000000040)=""/1, 0x1, 0x0) 19:34:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000180)) 19:34:22 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) 19:34:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) getrandom(&(0x7f0000000040)=""/1, 0x1, 0x0) 19:34:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) 19:34:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000180)) 19:34:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000300)=""/48, &(0x7f00000004c0)=0x30) 19:34:22 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000001c00)={@ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @loopback={0x0, 0x1}}) 19:34:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000180)) 19:34:23 executing program 4: socket$inet(0x2, 0x0, 0x0) getrandom(&(0x7f0000000040)=""/1, 0x1, 0x0) 19:34:23 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) 19:34:23 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) connect(0xffffffffffffffff, &(0x7f0000000000)=@sco={0x1f}, 0x80) 19:34:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000300)=""/48, &(0x7f00000004c0)=0x30) 19:34:23 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000100), 0x4) 19:34:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000300)=""/48, &(0x7f00000004c0)=0x30) 19:34:23 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) socket$l2tp(0x18, 0x1, 0x1) 19:34:23 executing program 4: socket$inet(0x2, 0x0, 0x0) getrandom(&(0x7f0000000040)=""/1, 0x1, 0x0) 19:34:23 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) connect(0xffffffffffffffff, &(0x7f0000000000)=@sco={0x1f}, 0x80) 19:34:23 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000100), 0x4) 19:34:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000300)=""/48, &(0x7f00000004c0)=0x30) 19:34:23 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000100), 0x4) 19:34:23 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) socket$l2tp(0x18, 0x1, 0x1) 19:34:23 executing program 4: socket$inet(0x2, 0x0, 0x0) getrandom(&(0x7f0000000040)=""/1, 0x1, 0x0) 19:34:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000001c00)={@ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @loopback={0x0, 0x1}}) [ 878.904832] kauditd_printk_skb: 6 callbacks suppressed [ 878.904853] audit: type=1326 audit(1529696063.903:1904): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22547 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000180)) 19:34:24 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) connect(0xffffffffffffffff, &(0x7f0000000000)=@sco={0x1f}, 0x80) 19:34:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000300)=""/48, &(0x7f00000004c0)=0x30) 19:34:24 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) prctl$seccomp(0x16, 0x0, &(0x7f00000004c0)={0x0, &(0x7f0000000440)}) 19:34:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) socket$l2tp(0x18, 0x1, 0x1) 19:34:24 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000100), 0x4) 19:34:24 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) getrandom(&(0x7f0000000040)=""/1, 0x1, 0x0) 19:34:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000300)=""/48, &(0x7f00000004c0)=0x30) [ 879.089648] audit: type=1326 audit(1529696064.087:1905): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22565 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:24 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) 19:34:24 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) connect(0xffffffffffffffff, &(0x7f0000000000)=@sco={0x1f}, 0x80) 19:34:24 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000100), 0x4) 19:34:24 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) prctl$seccomp(0x16, 0x0, &(0x7f00000004c0)={0x0, &(0x7f0000000440)}) 19:34:24 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) getrandom(&(0x7f0000000040)=""/1, 0x1, 0x0) 19:34:24 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) 19:34:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000300)=""/48, &(0x7f00000004c0)=0x30) [ 879.431203] audit: type=1326 audit(1529696064.428:1906): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22590 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000001c00)={@ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @loopback={0x0, 0x1}}) [ 879.830431] audit: type=1326 audit(1529696064.829:1907): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22603 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000180)) 19:34:25 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) connect(0xffffffffffffffff, &(0x7f0000000000)=@sco={0x1f}, 0x80) 19:34:25 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000100), 0x4) 19:34:25 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) 19:34:25 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) getrandom(&(0x7f0000000040)=""/1, 0x1, 0x0) 19:34:25 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) prctl$seccomp(0x16, 0x0, &(0x7f00000004c0)={0x0, &(0x7f0000000440)}) [ 880.057684] audit: type=1326 audit(1529696065.056:1908): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22618 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:25 executing program 0: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) 19:34:25 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000100), 0x4) 19:34:25 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) connect(0xffffffffffffffff, &(0x7f0000000000)=@sco={0x1f}, 0x80) 19:34:25 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) prctl$seccomp(0x16, 0x0, &(0x7f00000004c0)={0x0, &(0x7f0000000440)}) 19:34:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) getrandom(&(0x7f0000000040)=""/1, 0x1, 0x0) 19:34:25 executing program 0: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) 19:34:25 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000100), 0x4) 19:34:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000300)=""/48, &(0x7f00000004c0)=0x30) 19:34:25 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) connect(0xffffffffffffffff, &(0x7f0000000000)=@sco={0x1f}, 0x80) [ 880.507158] audit: type=1326 audit(1529696065.503:1909): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22648 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:25 executing program 3: socket$inet6(0xa, 0x0, 0x0) connect(0xffffffffffffffff, &(0x7f0000000000)=@sco={0x1f}, 0x80) 19:34:25 executing program 3: socket$inet6(0xa, 0x0, 0x0) connect(0xffffffffffffffff, &(0x7f0000000000)=@sco={0x1f}, 0x80) 19:34:25 executing program 0: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) 19:34:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) getrandom(&(0x7f0000000040)=""/1, 0x1, 0x0) 19:34:25 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) prctl$seccomp(0x16, 0x0, &(0x7f00000004c0)={0x0, &(0x7f0000000440)}) 19:34:25 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000100), 0x4) 19:34:25 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x19, 0x2, 0x0, [0x20000100, 0x0, 0x0, 0x20000208, 0x20000238], 0x0, &(0x7f0000000080), &(0x7f0000000100)=ANY=[]}, 0x78) 19:34:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000140)) 19:34:26 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000100), 0x4) 19:34:26 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) prctl$seccomp(0x16, 0x0, &(0x7f00000004c0)={0x0, &(0x7f0000000440)}) 19:34:26 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) 19:34:26 executing program 3: socket$inet6(0xa, 0x0, 0x0) connect(0xffffffffffffffff, &(0x7f0000000000)=@sco={0x1f}, 0x80) 19:34:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) getrandom(&(0x7f0000000040)=""/1, 0x1, 0x0) 19:34:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000140)) 19:34:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000300)=""/48, &(0x7f00000004c0)=0x30) 19:34:26 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x19, 0x2, 0x0, [0x20000100, 0x0, 0x0, 0x20000208, 0x20000238], 0x0, &(0x7f0000000080), &(0x7f0000000100)=ANY=[]}, 0x78) 19:34:26 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) prctl$seccomp(0x16, 0x0, &(0x7f00000004c0)={0x0, &(0x7f0000000440)}) 19:34:26 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) 19:34:26 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000100), 0x4) 19:34:26 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) connect(0xffffffffffffffff, &(0x7f0000000000)=@sco={0x1f}, 0x80) 19:34:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000140)) 19:34:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) getrandom(&(0x7f0000000040)=""/1, 0x1, 0x0) [ 881.567883] audit: type=1326 audit(1529696066.566:1910): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22723 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:26 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000100), 0x4) 19:34:26 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) 19:34:26 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000040)) prctl$seccomp(0x16, 0x0, &(0x7f00000004c0)={0x0, &(0x7f0000000440)}) 19:34:26 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x19, 0x2, 0x0, [0x20000100, 0x0, 0x0, 0x20000208, 0x20000238], 0x0, &(0x7f0000000080), &(0x7f0000000100)=ANY=[]}, 0x78) 19:34:26 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000100), 0x4) 19:34:26 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000040)) prctl$seccomp(0x16, 0x0, &(0x7f00000004c0)={0x0, &(0x7f0000000440)}) 19:34:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000140)) 19:34:26 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) 19:34:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000140)) 19:34:27 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) connect(0xffffffffffffffff, &(0x7f0000000000)=@sco={0x1f}, 0x80) 19:34:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) getrandom(&(0x7f0000000040)=""/1, 0x1, 0x0) 19:34:27 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x19, 0x2, 0x0, [0x20000100, 0x0, 0x0, 0x20000208, 0x20000238], 0x0, &(0x7f0000000080), &(0x7f0000000100)=ANY=[]}, 0x78) 19:34:27 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000040)) prctl$seccomp(0x16, 0x0, &(0x7f00000004c0)={0x0, &(0x7f0000000440)}) 19:34:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) 19:34:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000001380)='user\x00', &(0x7f00000013c0)={0x73, 0x79, 0x7a}, 0x0) 19:34:27 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000100), 0x4) 19:34:27 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000100), 0x4) 19:34:27 executing program 2: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) prctl$seccomp(0x16, 0x0, &(0x7f00000004c0)={0x0, &(0x7f0000000440)}) 19:34:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) 19:34:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000140)) 19:34:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) getrandom(&(0x7f0000000040)=""/1, 0x1, 0x0) 19:34:27 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x19, 0x2, 0x0, [0x20000100, 0x0, 0x0, 0x20000208, 0x20000238], 0x0, &(0x7f0000000080), &(0x7f0000000100)=ANY=[]}, 0x78) 19:34:27 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) connect(0xffffffffffffffff, &(0x7f0000000000)=@sco={0x1f}, 0x80) 19:34:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000001380)='user\x00', &(0x7f00000013c0)={0x73, 0x79, 0x7a}, 0x0) 19:34:27 executing program 2: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) prctl$seccomp(0x16, 0x0, &(0x7f00000004c0)={0x0, &(0x7f0000000440)}) 19:34:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) 19:34:27 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000100), 0x4) 19:34:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000140)) 19:34:28 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x19, 0x2, 0x0, [0x20000100, 0x0, 0x0, 0x20000208, 0x20000238], 0x0, &(0x7f0000000080), &(0x7f0000000100)=ANY=[]}, 0x78) [ 883.016392] audit: type=1326 audit(1529696068.015:1911): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22822 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) getrandom(&(0x7f0000000040)=""/1, 0x1, 0x0) 19:34:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000001380)='user\x00', &(0x7f00000013c0)={0x73, 0x79, 0x7a}, 0x0) 19:34:28 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket$inet6(0xa, 0x0, 0x0) connect(0xffffffffffffffff, &(0x7f0000000000)=@sco={0x1f}, 0x80) 19:34:28 executing program 2: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) prctl$seccomp(0x16, 0x0, &(0x7f00000004c0)={0x0, &(0x7f0000000440)}) 19:34:28 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000100), 0x4) [ 883.148457] audit: type=1326 audit(1529696068.147:1912): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22834 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:28 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x19, 0x2, 0x0, [0x20000100, 0x0, 0x0, 0x20000208, 0x20000238], 0x0, &(0x7f0000000080), &(0x7f0000000100)=ANY=[]}, 0x78) 19:34:28 executing program 7: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000140)) 19:34:28 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) prctl$seccomp(0x16, 0x0, &(0x7f00000004c0)={0x0, &(0x7f0000000440)}) 19:34:28 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000100), 0x4) 19:34:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000001380)='user\x00', &(0x7f00000013c0)={0x73, 0x79, 0x7a}, 0x0) 19:34:28 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket$inet6(0xa, 0x0, 0x0) connect(0xffffffffffffffff, &(0x7f0000000000)=@sco={0x1f}, 0x80) 19:34:28 executing program 7: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000140)) 19:34:28 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) prctl$seccomp(0x16, 0x0, &(0x7f00000004c0)={0x0, &(0x7f0000000440)}) 19:34:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) 19:34:28 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x19, 0x2, 0x0, [0x20000100, 0x0, 0x0, 0x20000208, 0x20000238], 0x0, &(0x7f0000000080), &(0x7f0000000100)=ANY=[]}, 0x78) 19:34:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) keyctl$search(0xa, 0x0, &(0x7f0000001380)='user\x00', &(0x7f00000013c0)={0x73, 0x79, 0x7a}, 0x0) [ 883.927686] audit: type=1326 audit(1529696068.925:1913): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22886 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:29 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) getrandom(&(0x7f0000000040)=""/1, 0x1, 0x0) 19:34:29 executing program 7: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000140)) 19:34:29 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket$inet6(0xa, 0x0, 0x0) connect(0xffffffffffffffff, &(0x7f0000000000)=@sco={0x1f}, 0x80) 19:34:29 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000100), 0x4) 19:34:29 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x19, 0x2, 0x0, [0x20000100, 0x0, 0x0, 0x20000208, 0x20000238], 0x0, &(0x7f0000000080), &(0x7f0000000100)=ANY=[]}, 0x78) 19:34:29 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) prctl$seccomp(0x16, 0x0, &(0x7f00000004c0)={0x0, &(0x7f0000000440)}) 19:34:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) keyctl$search(0xa, 0x0, &(0x7f0000001380)='user\x00', &(0x7f00000013c0)={0x73, 0x79, 0x7a}, 0x0) [ 884.135712] audit: type=1326 audit(1529696069.134:1914): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22907 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:29 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) prctl$seccomp(0x16, 0x0, &(0x7f00000004c0)={0x0, &(0x7f0000000440)}) 19:34:29 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000140)) 19:34:29 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x19, 0x2, 0x0, [0x20000100, 0x0, 0x0, 0x20000208, 0x20000238], 0x0, &(0x7f0000000080), &(0x7f0000000100)=ANY=[]}, 0x78) 19:34:29 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000100), 0x4) 19:34:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) keyctl$search(0xa, 0x0, &(0x7f0000001380)='user\x00', &(0x7f00000013c0)={0x73, 0x79, 0x7a}, 0x0) 19:34:29 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) connect(0xffffffffffffffff, &(0x7f0000000000)=@sco={0x1f}, 0x80) [ 884.376265] audit: type=1326 audit(1529696069.374:1915): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22917 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) 19:34:29 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) prctl$seccomp(0x16, 0x0, &(0x7f00000004c0)={0x0, &(0x7f0000000440)}) 19:34:29 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x19, 0x2, 0x0, [0x20000100, 0x0, 0x0, 0x20000208, 0x20000238], 0x0, &(0x7f0000000080), &(0x7f0000000100)=ANY=[]}, 0x78) [ 884.907384] audit: type=1326 audit(1529696069.906:1916): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22941 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:30 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000001380)='user\x00', &(0x7f00000013c0)={0x73, 0x79, 0x7a}, 0x0) 19:34:30 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) connect(0xffffffffffffffff, &(0x7f0000000000)=@sco={0x1f}, 0x80) 19:34:30 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000140)) 19:34:30 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x19, 0x2, 0x0, [0x20000100, 0x0, 0x0, 0x20000208, 0x20000238], 0x0, &(0x7f0000000080), &(0x7f0000000100)=ANY=[]}, 0x78) 19:34:30 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) prctl$seccomp(0x16, 0x0, &(0x7f00000004c0)={0x0, &(0x7f0000000440)}) 19:34:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) getrandom(&(0x7f0000000040)=""/1, 0x1, 0x0) 19:34:30 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000001380)='user\x00', &(0x7f00000013c0)={0x73, 0x79, 0x7a}, 0x0) [ 885.124301] audit: type=1326 audit(1529696070.122:1917): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22958 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:30 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) prctl$seccomp(0x16, 0x0, &(0x7f00000004c0)={0x0, &(0x7f0000000440)}) 19:34:30 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x19, 0x2, 0x0, [0x20000100, 0x0, 0x0, 0x20000208, 0x20000238], 0x0, &(0x7f0000000080), &(0x7f0000000100)=ANY=[]}, 0x78) 19:34:30 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000140)) 19:34:30 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000100), 0x4) 19:34:30 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) connect(0xffffffffffffffff, &(0x7f0000000000)=@sco={0x1f}, 0x80) [ 885.291915] audit: type=1326 audit(1529696070.290:1918): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22967 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:30 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000001380)='user\x00', &(0x7f00000013c0)={0x73, 0x79, 0x7a}, 0x0) [ 885.413279] audit: type=1326 audit(1529696070.411:1919): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22977 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000140)) 19:34:30 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x19, 0x2, 0x0, [0x20000100, 0x0, 0x0, 0x20000208, 0x20000238], 0x0, &(0x7f0000000080), &(0x7f0000000100)=ANY=[]}, 0x78) 19:34:30 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000001380)='user\x00', &(0x7f00000013c0)={0x73, 0x79, 0x7a}, 0x0) 19:34:30 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) connect(0xffffffffffffffff, &(0x7f0000000000)=@sco={0x1f}, 0x80) [ 885.852381] audit: type=1326 audit(1529696070.851:1920): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22990 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:31 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x19, 0x2, 0x0, [0x20000100, 0x0, 0x0, 0x20000208, 0x20000238], 0x0, &(0x7f0000000080), &(0x7f0000000100)=ANY=[]}, 0x78) 19:34:31 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) 19:34:31 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000001380)='user\x00', &(0x7f00000013c0)={0x73, 0x79, 0x7a}, 0x0) 19:34:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000140)) 19:34:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f0000000040)=@kern={0x10}, 0xc, &(0x7f00000000c0), 0x0, &(0x7f00000019c0)}, 0x0) 19:34:31 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x19, 0x2, 0x0, [0x20000100, 0x0, 0x0, 0x20000208, 0x20000238], 0x0, &(0x7f0000000080), &(0x7f0000000100)=ANY=[]}, 0x78) 19:34:31 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) prctl$seccomp(0x16, 0x0, &(0x7f00000004c0)={0x0, &(0x7f0000000440)}) 19:34:31 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000001380)='user\x00', &(0x7f00000013c0)={0x73, 0x79, 0x7a}, 0x0) 19:34:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000140)) 19:34:31 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000100), 0x4) 19:34:31 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) 19:34:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f0000000040)=@kern={0x10}, 0xc, &(0x7f00000000c0), 0x0, &(0x7f00000019c0)}, 0x0) 19:34:31 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x19, 0x2, 0x0, [0x20000100, 0x0, 0x0, 0x20000208, 0x20000238], 0x0, &(0x7f0000000080), &(0x7f0000000100)=ANY=[]}, 0x78) [ 886.393744] audit: type=1326 audit(1529696071.392:1921): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23028 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000001380)='user\x00', &(0x7f00000013c0)={0x73, 0x79, 0x7a}, 0x0) 19:34:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fe}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000140)) [ 886.530228] audit: type=1326 audit(1529696071.528:1922): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23039 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:31 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) 19:34:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fe}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000140)) 19:34:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f0000000040)=@kern={0x10}, 0xc, &(0x7f00000000c0), 0x0, &(0x7f00000019c0)}, 0x0) 19:34:31 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x19, 0x2, 0x0, [0x20000100, 0x0, 0x0, 0x20000208, 0x20000238], 0x0, &(0x7f0000000080), &(0x7f0000000100)=ANY=[]}, 0x78) 19:34:31 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) connect(0xffffffffffffffff, &(0x7f0000000000)=@sco={0x1f}, 0x80) 19:34:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000001380)='user\x00', &(0x7f00000013c0)={0x73, 0x79, 0x7a}, 0x0) 19:34:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fe}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000140)) 19:34:32 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) prctl$seccomp(0x16, 0x0, &(0x7f00000004c0)={0x0, &(0x7f0000000440)}) 19:34:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000001380)='user\x00', &(0x7f00000013c0)={0x73, 0x79, 0x7a}, 0x0) 19:34:32 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x19, 0x2, 0x0, [0x20000100, 0x0, 0x0, 0x20000208, 0x20000238], 0x0, &(0x7f0000000080), &(0x7f0000000100)=ANY=[]}, 0x78) 19:34:32 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x19, 0x2, 0x0, [0x20000100, 0x0, 0x0, 0x20000208, 0x20000238], 0x0, &(0x7f0000000080), &(0x7f0000000100)=ANY=[]}, 0x78) 19:34:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f0000000040)=@kern={0x10}, 0xc, &(0x7f00000000c0), 0x0, &(0x7f00000019c0)}, 0x0) 19:34:32 executing program 0: 19:34:32 executing program 6: 19:34:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000001380)='user\x00', &(0x7f00000013c0)={0x73, 0x79, 0x7a}, 0x0) 19:34:32 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000140)) 19:34:32 executing program 0: 19:34:32 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) connect(0xffffffffffffffff, &(0x7f0000000000)=@sco={0x1f}, 0x80) 19:34:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000001380)='user\x00', &(0x7f00000013c0)={0x73, 0x79, 0x7a}, 0x0) 19:34:32 executing program 6: 19:34:32 executing program 0: 19:34:32 executing program 4: 19:34:32 executing program 4: 19:34:33 executing program 0: 19:34:33 executing program 6: 19:34:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000001380)='user\x00', &(0x7f00000013c0)={0x73, 0x79, 0x7a}, 0x0) 19:34:33 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x19, 0x2, 0x0, [0x20000100, 0x0, 0x0, 0x20000208, 0x20000238], 0x0, &(0x7f0000000080), &(0x7f0000000100)=ANY=[]}, 0x78) 19:34:33 executing program 4: 19:34:33 executing program 2: 19:34:33 executing program 6: 19:34:33 executing program 0: 19:34:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000001380)='user\x00', &(0x7f00000013c0)={0x73, 0x79, 0x7a}, 0x0) 19:34:33 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000140)) 19:34:33 executing program 6: 19:34:33 executing program 0: 19:34:33 executing program 4: 19:34:33 executing program 2: 19:34:33 executing program 3: 19:34:33 executing program 2: 19:34:33 executing program 6: 19:34:33 executing program 0: 19:34:33 executing program 4: 19:34:34 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x19, 0x2, 0x0, [0x20000100, 0x0, 0x0, 0x20000208, 0x20000238], 0x0, &(0x7f0000000080), &(0x7f0000000100)=ANY=[]}, 0x78) 19:34:34 executing program 6: 19:34:34 executing program 3: 19:34:34 executing program 2: 19:34:34 executing program 4: 19:34:34 executing program 0: 19:34:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000001380)='user\x00', &(0x7f00000013c0)={0x73, 0x79, 0x7a}, 0x0) 19:34:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000140)) 19:34:34 executing program 2: 19:34:34 executing program 4: 19:34:34 executing program 6: 19:34:34 executing program 3: [ 889.434989] kauditd_printk_skb: 8 callbacks suppressed [ 889.435012] audit: type=1326 audit(1529696074.433:1931): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23174 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:34 executing program 0: 19:34:34 executing program 2: 19:34:34 executing program 3: 19:34:34 executing program 6: [ 889.622523] audit: type=1326 audit(1529696074.478:1932): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23177 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 889.642515] audit: type=1326 audit(1529696074.567:1933): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23185 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:35 executing program 3: 19:34:35 executing program 4: 19:34:35 executing program 0: 19:34:35 executing program 2: 19:34:35 executing program 6: 19:34:35 executing program 5: 19:34:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000001380)='user\x00', &(0x7f00000013c0)={0x73, 0x79, 0x7a}, 0x0) 19:34:35 executing program 2: 19:34:35 executing program 0: 19:34:35 executing program 6: 19:34:35 executing program 3: 19:34:35 executing program 5: 19:34:35 executing program 4: 19:34:35 executing program 7: [ 890.595525] audit: type=1326 audit(1529696075.594:1934): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23224 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:35 executing program 6: 19:34:35 executing program 0: 19:34:35 executing program 4: 19:34:35 executing program 3: 19:34:35 executing program 2: 19:34:35 executing program 5: 19:34:35 executing program 7: 19:34:35 executing program 6: 19:34:36 executing program 6: 19:34:36 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000140)=""/73, 0x49, 0x0, &(0x7f00000001c0)=@abs, 0x6e) 19:34:36 executing program 4: 19:34:36 executing program 5: 19:34:36 executing program 3: 19:34:36 executing program 2: 19:34:36 executing program 1: 19:34:36 executing program 7: 19:34:36 executing program 5: 19:34:36 executing program 6: 19:34:36 executing program 7: 19:34:36 executing program 4: 19:34:36 executing program 3: 19:34:36 executing program 2: 19:34:36 executing program 1: 19:34:36 executing program 5: 19:34:36 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000140)=""/73, 0x49, 0x0, &(0x7f00000001c0)=@abs, 0x6e) 19:34:36 executing program 1: 19:34:36 executing program 4: 19:34:36 executing program 2: 19:34:36 executing program 6: 19:34:36 executing program 7: 19:34:36 executing program 3: 19:34:37 executing program 5: 19:34:37 executing program 2: 19:34:37 executing program 4: 19:34:37 executing program 3: 19:34:37 executing program 6: 19:34:37 executing program 1: 19:34:37 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000140)=""/73, 0x49, 0x0, &(0x7f00000001c0)=@abs, 0x6e) 19:34:37 executing program 7: 19:34:37 executing program 5: 19:34:37 executing program 3: 19:34:37 executing program 2: 19:34:37 executing program 4: 19:34:37 executing program 7: 19:34:37 executing program 6: 19:34:37 executing program 1: 19:34:37 executing program 5: 19:34:37 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000140)=""/73, 0x49, 0x0, &(0x7f00000001c0)=@abs, 0x6e) 19:34:37 executing program 3: 19:34:37 executing program 7: 19:34:37 executing program 2: 19:34:37 executing program 4: 19:34:37 executing program 6: 19:34:37 executing program 1: 19:34:37 executing program 5: 19:34:37 executing program 3: 19:34:37 executing program 7: 19:34:37 executing program 4: 19:34:37 executing program 6: 19:34:37 executing program 2: 19:34:37 executing program 1: 19:34:37 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000140)=""/73, 0x49, 0x0, &(0x7f00000001c0)=@abs, 0x6e) 19:34:37 executing program 5: 19:34:37 executing program 3: 19:34:37 executing program 4: 19:34:37 executing program 7: 19:34:38 executing program 6: 19:34:38 executing program 5: 19:34:38 executing program 1: 19:34:38 executing program 2: 19:34:38 executing program 3: 19:34:38 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000140)=""/73, 0x49, 0x0, &(0x7f00000001c0)=@abs, 0x6e) 19:34:38 executing program 7: 19:34:38 executing program 6: 19:34:38 executing program 4: 19:34:38 executing program 1: 19:34:38 executing program 2: 19:34:38 executing program 5: 19:34:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f00000000c0)) 19:34:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000000c0)) 19:34:38 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50243}]}) add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000180), 0x0, 0xfffffffffffffffe) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000100)) 19:34:38 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 19:34:38 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000140)=""/73, 0x49, 0x0, &(0x7f00000001c0)=@abs, 0x6e) 19:34:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000040)=ANY=[]) socket$alg(0x26, 0x5, 0x0) 19:34:38 executing program 1: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 19:34:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) mlockall(0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000180)=""/246) 19:34:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000080)) getpgrp(0x0) 19:34:38 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) 19:34:38 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000140)=""/73, 0x49, 0x0, &(0x7f00000001c0)=@abs, 0x6e) 19:34:38 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50243}]}) add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000180), 0x0, 0xfffffffffffffffe) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000100)) 19:34:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000000c0)) 19:34:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) mlockall(0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000180)=""/246) 19:34:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000040)=ANY=[]) socket$alg(0x26, 0x5, 0x0) 19:34:38 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) getitimer(0x0, &(0x7f00000000c0)) 19:34:38 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000140)=""/73, 0x49, 0x0, &(0x7f00000001c0)=@abs, 0x6e) 19:34:39 executing program 1: r0 = socket$inet6(0xa, 0x1800000000003, 0x1) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'vmac(aes-asm)\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000000), 0x0) sendmsg$alg(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000140)}], 0x1, &(0x7f0000000040)}, 0x0) sendmsg$alg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) 19:34:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) seccomp(0x0, 0x0, &(0x7f0000000180)={0xbf34b854c3fe40f0}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000040)=""/59, 0x3b, 0x0, &(0x7f0000000080)={0x77359400}) 19:34:39 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50243}]}) add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000180), 0x0, 0xfffffffffffffffe) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000100)) 19:34:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) mlockall(0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000180)=""/246) 19:34:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000000c0)) 19:34:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000040)=ANY=[]) socket$alg(0x26, 0x5, 0x0) 19:34:39 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000140)=""/73, 0x49, 0x0, &(0x7f00000001c0)=@abs, 0x6e) 19:34:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) getitimer(0x0, &(0x7f00000000c0)) 19:34:39 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50243}]}) add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000180), 0x0, 0xfffffffffffffffe) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000100)) 19:34:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000000c0)) 19:34:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) mlockall(0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000180)=""/246) 19:34:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) seccomp(0x0, 0x0, &(0x7f0000000180)={0xbf34b854c3fe40f0}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000040)=""/59, 0x3b, 0x0, &(0x7f0000000080)={0x77359400}) 19:34:39 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000140)=""/73, 0x49, 0x0, &(0x7f00000001c0)=@abs, 0x6e) 19:34:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000040)=ANY=[]) socket$alg(0x26, 0x5, 0x0) 19:34:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) getitimer(0x0, &(0x7f00000000c0)) 19:34:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000026c0)) 19:34:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) seccomp(0x0, 0x0, &(0x7f0000000180)={0xbf34b854c3fe40f0}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000040)=""/59, 0x3b, 0x0, &(0x7f0000000080)={0x77359400}) 19:34:39 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50243}]}) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000100)) 19:34:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000000c0)) 19:34:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000180)=""/246) 19:34:39 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000140)=""/73, 0x49, 0x0, &(0x7f00000001c0)=@abs, 0x6e) 19:34:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) socket$alg(0x26, 0x5, 0x0) 19:34:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) getitimer(0x0, &(0x7f00000000c0)) 19:34:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f00000003c0)) 19:34:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) seccomp(0x0, 0x0, &(0x7f0000000180)={0xbf34b854c3fe40f0}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000040)=""/59, 0x3b, 0x0, &(0x7f0000000080)={0x77359400}) 19:34:39 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000140)=""/73, 0x49, 0x0, &(0x7f00000001c0)=@abs, 0x6e) 19:34:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000180)=""/246) 19:34:39 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50243}]}) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000100)) 19:34:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000000c0)) 19:34:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) socket$alg(0x26, 0x5, 0x0) 19:34:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) getitimer(0x0, &(0x7f00000000c0)) 19:34:40 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000140)=""/73, 0x49, 0x0, &(0x7f00000001c0)=@abs, 0x6e) 19:34:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000180)=""/246) 19:34:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000040)=""/59, 0x3b, 0x0, &(0x7f0000000080)={0x77359400}) 19:34:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000000c0)) 19:34:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f00000003c0)) 19:34:40 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50243}]}) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000100)) 19:34:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) socket$alg(0x26, 0x5, 0x0) 19:34:40 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000140)=""/73, 0x49, 0x0, &(0x7f00000001c0)=@abs, 0x6e) 19:34:40 executing program 5: mlockall(0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000180)=""/246) 19:34:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) getitimer(0x0, &(0x7f00000000c0)) 19:34:40 executing program 6: mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000000c0)) 19:34:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000040)=""/59, 0x3b, 0x0, &(0x7f0000000080)={0x77359400}) 19:34:40 executing program 2: add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000180), 0x0, 0xfffffffffffffffe) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000100)) 19:34:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f00000003c0)) 19:34:40 executing program 7: ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000040)=ANY=[]) socket$alg(0x26, 0x5, 0x0) 19:34:40 executing program 5: mlockall(0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000180)=""/246) 19:34:40 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000140)=""/73, 0x49, 0x0, &(0x7f00000001c0)=@abs, 0x6e) 19:34:40 executing program 6: mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000000c0)) 19:34:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000040)=""/59, 0x3b, 0x0, &(0x7f0000000080)={0x77359400}) 19:34:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) getitimer(0x0, &(0x7f00000000c0)) 19:34:40 executing program 2: add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000180), 0x0, 0xfffffffffffffffe) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000100)) 19:34:40 executing program 5: mlockall(0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000180)=""/246) 19:34:40 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023e}]}) seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000140)=""/73, 0x49, 0x0, &(0x7f00000001c0)=@abs, 0x6e) 19:34:40 executing program 7: ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000040)=ANY=[]) socket$alg(0x26, 0x5, 0x0) 19:34:41 executing program 6: mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000000c0)) 19:34:41 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f00000003c0)) 19:34:41 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) mlockall(0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000180)=""/246) 19:34:41 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0xbf34b854c3fe40f0}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000040)=""/59, 0x3b, 0x0, &(0x7f0000000080)={0x77359400}) 19:34:41 executing program 2: add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000180), 0x0, 0xfffffffffffffffe) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000100)) 19:34:41 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023e}]}) seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000140)=""/73, 0x49, 0x0, &(0x7f00000001c0)=@abs, 0x6e) 19:34:41 executing program 4: socket$inet(0x2, 0x0, 0x0) getitimer(0x0, &(0x7f00000000c0)) 19:34:41 executing program 7: ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000040)=ANY=[]) socket$alg(0x26, 0x5, 0x0) 19:34:41 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000000c0)) 19:34:41 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 19:34:41 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) mlockall(0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000180)=""/246) 19:34:41 executing program 2: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50243}]}) add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000180), 0x0, 0xfffffffffffffffe) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000100)) 19:34:41 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0xbf34b854c3fe40f0}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000040)=""/59, 0x3b, 0x0, &(0x7f0000000080)={0x77359400}) 19:34:41 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023e}]}) seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000140)=""/73, 0x49, 0x0, &(0x7f00000001c0)=@abs, 0x6e) 19:34:41 executing program 7: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000040)=ANY=[]) socket$alg(0x26, 0x5, 0x0) 19:34:41 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000000c0)) 19:34:41 executing program 4: socket$inet(0x2, 0x0, 0x0) getitimer(0x0, &(0x7f00000000c0)) 19:34:41 executing program 2: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50243}]}) add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000180), 0x0, 0xfffffffffffffffe) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000100)) 19:34:41 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0xbf34b854c3fe40f0}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000040)=""/59, 0x3b, 0x0, &(0x7f0000000080)={0x77359400}) 19:34:41 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) mlockall(0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000180)=""/246) 19:34:41 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 19:34:41 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000140)=""/73, 0x49, 0x0, &(0x7f00000001c0)=@abs, 0x6e) 19:34:41 executing program 7: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000040)=ANY=[]) socket$alg(0x26, 0x5, 0x0) 19:34:41 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000000c0)) [ 896.851684] audit: type=1326 audit(1529696081.850:1935): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23699 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:41 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) seccomp(0x0, 0x0, &(0x7f0000000180)={0xbf34b854c3fe40f0}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000040)=""/59, 0x3b, 0x0, &(0x7f0000000080)={0x77359400}) 19:34:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) mlockall(0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000180)=""/246) 19:34:41 executing program 2: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50243}]}) add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000180), 0x0, 0xfffffffffffffffe) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000100)) 19:34:41 executing program 4: socket$inet(0x2, 0x0, 0x0) getitimer(0x0, &(0x7f00000000c0)) 19:34:42 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 19:34:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000000c0)) 19:34:42 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) seccomp(0x0, 0x0, &(0x7f0000000180)={0xbf34b854c3fe40f0}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000040)=""/59, 0x3b, 0x0, &(0x7f0000000080)={0x77359400}) 19:34:42 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000180), 0x0, 0xfffffffffffffffe) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000100)) 19:34:42 executing program 7: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000040)=ANY=[]) socket$alg(0x26, 0x5, 0x0) 19:34:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) mlockall(0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000180)=""/246) 19:34:42 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) getitimer(0x0, &(0x7f00000000c0)) 19:34:42 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) seccomp(0x0, 0x0, &(0x7f0000000180)={0xbf34b854c3fe40f0}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000040)=""/59, 0x3b, 0x0, &(0x7f0000000080)={0x77359400}) 19:34:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000000c0)) 19:34:42 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000140)=""/73, 0x49, 0x0, &(0x7f00000001c0)=@abs, 0x6e) 19:34:42 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000040)=ANY=[]) socket$alg(0x26, 0x5, 0x0) 19:34:42 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 19:34:42 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000180), 0x0, 0xfffffffffffffffe) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000100)) 19:34:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) mlockall(0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000180)=""/246) 19:34:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000180)={0xbf34b854c3fe40f0}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000040)=""/59, 0x3b, 0x0, &(0x7f0000000080)={0x77359400}) 19:34:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000000c0)) 19:34:42 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) getitimer(0x0, &(0x7f00000000c0)) [ 897.818727] audit: type=1326 audit(1529696082.817:1936): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23764 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000180)={0xbf34b854c3fe40f0}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000040)=""/59, 0x3b, 0x0, &(0x7f0000000080)={0x77359400}) 19:34:42 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000040)=ANY=[]) socket$alg(0x26, 0x5, 0x0) 19:34:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501cd}]}) mlockall(0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000180)=""/246) 19:34:42 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) getitimer(0x0, &(0x7f00000000c0)) 19:34:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501cd}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000000c0)) 19:34:42 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000180), 0x0, 0xfffffffffffffffe) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000100)) 19:34:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 19:34:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000180)={0xbf34b854c3fe40f0}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000040)=""/59, 0x3b, 0x0, &(0x7f0000000080)={0x77359400}) 19:34:43 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000140)=""/73, 0x49, 0x0, &(0x7f00000001c0)=@abs, 0x6e) 19:34:43 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50243}]}) add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000180), 0x0, 0xfffffffffffffffe) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000100)) 19:34:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501cd}]}) mlockall(0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000180)=""/246) 19:34:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000040)=ANY=[]) socket$alg(0x26, 0x5, 0x0) 19:34:43 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501cd}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000000c0)) 19:34:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 19:34:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) getitimer(0x0, &(0x7f00000000c0)) 19:34:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023d}]}) seccomp(0x0, 0x0, &(0x7f0000000180)={0xbf34b854c3fe40f0}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000040)=""/59, 0x3b, 0x0, &(0x7f0000000080)={0x77359400}) [ 898.782888] audit: type=1326 audit(1529696083.781:1937): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23812 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:43 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501cd}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000000c0)) 19:34:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000040)=ANY=[]) socket$alg(0x26, 0x5, 0x0) 19:34:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023d}]}) seccomp(0x0, 0x0, &(0x7f0000000180)={0xbf34b854c3fe40f0}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000040)=""/59, 0x3b, 0x0, &(0x7f0000000080)={0x77359400}) 19:34:43 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50243}]}) add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000180), 0x0, 0xfffffffffffffffe) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000100)) 19:34:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501cd}]}) mlockall(0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000180)=""/246) 19:34:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 19:34:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) getitimer(0x0, &(0x7f00000000c0)) 19:34:44 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50243}]}) add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000180), 0x0, 0xfffffffffffffffe) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000100)) 19:34:44 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6}]}) add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000180), 0x0, 0xfffffffffffffffe) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000100)) 19:34:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000040)=ANY=[]) socket$alg(0x26, 0x5, 0x0) 19:34:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000000c0)) 19:34:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023d}]}) seccomp(0x0, 0x0, &(0x7f0000000180)={0xbf34b854c3fe40f0}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000040)=""/59, 0x3b, 0x0, &(0x7f0000000080)={0x77359400}) 19:34:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000280)}, 0x0) 19:34:44 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 19:34:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) mlockall(0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000180)=""/246) 19:34:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) getitimer(0x0, &(0x7f00000000c0)) [ 899.728866] audit: type=1326 audit(1529696084.727:1938): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23865 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000180)={0xbf34b854c3fe40f0}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000040)=""/59, 0x3b, 0x0, &(0x7f0000000080)={0x77359400}) [ 899.802512] audit: type=1326 audit(1529696084.800:1939): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23869 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:44 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 19:34:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000040)=ANY=[]) socket$alg(0x26, 0x5, 0x0) 19:34:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) [ 899.942507] audit: type=1326 audit(1529696084.941:1940): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23885 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 899.962431] audit: type=1326 audit(1529696084.941:1941): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23866 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:45 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 19:34:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000040)=ANY=[]) socket$alg(0x26, 0x5, 0x0) 19:34:45 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) getitimer(0x0, &(0x7f00000000c0)) [ 900.157378] audit: type=1326 audit(1529696085.156:1942): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23899 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:45 executing program 1: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 19:34:45 executing program 1: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 19:34:45 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6}]}) add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000180), 0x0, 0xfffffffffffffffe) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000100)) 19:34:45 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) getitimer(0x0, &(0x7f00000000c0)) 19:34:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000000c0)) 19:34:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) mlockall(0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000180)=""/246) 19:34:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000001800)) [ 900.733654] audit: type=1326 audit(1529696085.732:1943): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23926 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 900.753577] audit: type=1326 audit(1529696085.734:1944): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23922 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:45 executing program 1: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 19:34:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000180)={0xbf34b854c3fe40f0}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000040)=""/59, 0x3b, 0x0, &(0x7f0000000080)={0x77359400}) 19:34:45 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) getitimer(0x0, &(0x7f00000000c0)) 19:34:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000001800)) 19:34:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 19:34:46 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000001800)) 19:34:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000040)=ANY=[]) socket$alg(0x26, 0x5, 0x0) 19:34:46 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) getitimer(0x0, &(0x7f00000000c0)) 19:34:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 19:34:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 19:34:46 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000001800)) 19:34:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 19:34:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) mlockall(0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000180)=""/246) 19:34:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 19:34:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000000c0)) 19:34:46 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6}]}) add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000180), 0x0, 0xfffffffffffffffe) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000100)) 19:34:46 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000001800)) 19:34:46 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000180)={0xbf34b854c3fe40f0}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000040)=""/59, 0x3b, 0x0, &(0x7f0000000080)={0x77359400}) 19:34:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 19:34:46 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000001800)) 19:34:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) [ 901.935469] kauditd_printk_skb: 7 callbacks suppressed [ 901.935491] audit: type=1326 audit(1529696086.934:1952): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23999 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000001800)) [ 902.013983] audit: type=1326 audit(1529696087.012:1953): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24002 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:47 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000040)=ANY=[]) socket$alg(0x26, 0x5, 0x0) 19:34:47 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) getitimer(0x0, &(0x7f00000000c0)) 19:34:47 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000001800)) [ 902.225142] audit: type=1326 audit(1529696087.223:1954): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24010 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 902.267778] audit: type=1326 audit(1529696087.265:1955): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24012 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:47 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000001800)) 19:34:47 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000001800)) 19:34:47 executing program 0: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000001800)) 19:34:47 executing program 0: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000001800)) 19:34:47 executing program 0: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000001800)) 19:34:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) time(&(0x7f0000000200)) 19:34:47 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), 0x0) 19:34:47 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) times(&(0x7f0000000000)) 19:34:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000001800)) 19:34:47 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0)={0x0, {{0xa}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}}, 0x104) 19:34:47 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), 0x0) 19:34:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 19:34:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000001800)) [ 903.104123] audit: type=1326 audit(1529696088.102:1956): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24063 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), 0x0) 19:34:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) time(&(0x7f0000000200)) 19:34:48 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000080)=0x3) 19:34:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) getitimer(0x0, &(0x7f00000000c0)) 19:34:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) accept4(0xffffffffffffff9c, &(0x7f00000000c0)=@ethernet={0x0, @local}, &(0x7f0000000040)=0x80, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000001c0)=""/113, &(0x7f0000000240)=0x71) 19:34:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000001800)) 19:34:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0)={0x0, {{0xa}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}}, 0x104) [ 903.291766] audit: type=1326 audit(1529696088.290:1957): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24074 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) time(&(0x7f0000000200)) 19:34:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000001800)) 19:34:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), 0x0) 19:34:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) accept4(0xffffffffffffff9c, &(0x7f00000000c0)=@ethernet={0x0, @local}, &(0x7f0000000040)=0x80, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000001c0)=""/113, &(0x7f0000000240)=0x71) 19:34:48 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000140)) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f00000000c0)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'ovf\x00'}, 0x2c) 19:34:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0)={0x0, {{0xa}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}}, 0x104) 19:34:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000001800)) 19:34:49 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 19:34:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) time(&(0x7f0000000200)) 19:34:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), 0x0) 19:34:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0)={0x0, {{0xa}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}}, 0x104) 19:34:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) accept4(0xffffffffffffff9c, &(0x7f00000000c0)=@ethernet={0x0, @local}, &(0x7f0000000040)=0x80, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000001c0)=""/113, &(0x7f0000000240)=0x71) 19:34:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000001800)) [ 904.072801] audit: type=1326 audit(1529696089.071:1958): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24128 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), 0x0) 19:34:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 19:34:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000001800)) 19:34:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) accept4(0xffffffffffffff9c, &(0x7f00000000c0)=@ethernet={0x0, @local}, &(0x7f0000000040)=0x80, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000001c0)=""/113, &(0x7f0000000240)=0x71) 19:34:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) time(&(0x7f0000000200)) 19:34:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0)={0x0, {{0xa}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}}, 0x104) 19:34:49 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000080), 0x4) [ 904.273578] audit: type=1326 audit(1529696089.272:1959): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24138 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) time(&(0x7f0000000200)) 19:34:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), 0x0) 19:34:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0)={0x0, {{0xa}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}}, 0x104) 19:34:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0)={0x0, {{0xa}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}}, 0x104) 19:34:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000001c0)=""/113, &(0x7f0000000240)=0x71) 19:34:49 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000080), 0x4) 19:34:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 19:34:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) time(&(0x7f0000000200)) 19:34:49 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) seccomp(0x0, 0x0, &(0x7f0000000180)={0xbf34b854c3fe40f0}) socket$inet_tcp(0x2, 0x1, 0x0) 19:34:49 executing program 6: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), 0x0) 19:34:50 executing program 6: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), 0x0) 19:34:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000001800)) 19:34:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000001c0)=""/113, &(0x7f0000000240)=0x71) 19:34:50 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0)={0x0, {{0xa}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}}, 0x104) 19:34:50 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000080), 0x4) 19:34:50 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) time(&(0x7f0000000200)) 19:34:50 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 19:34:50 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) seccomp(0x0, 0x0, &(0x7f0000000180)={0xbf34b854c3fe40f0}) socket$inet_tcp(0x2, 0x1, 0x0) 19:34:50 executing program 6: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), 0x0) [ 905.346291] audit: type=1326 audit(1529696090.345:1960): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24206 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:50 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) time(&(0x7f0000000200)) 19:34:50 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 19:34:50 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0)={0x0, {{0xa}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}}, 0x104) 19:34:50 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) seccomp(0x0, 0x0, &(0x7f0000000180)={0xbf34b854c3fe40f0}) socket$inet_tcp(0x2, 0x1, 0x0) 19:34:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000001c0)=""/113, &(0x7f0000000240)=0x71) 19:34:50 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000080), 0x4) 19:34:50 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), 0x0) 19:34:50 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) time(&(0x7f0000000200)) 19:34:51 executing program 5: accept4(0xffffffffffffff9c, &(0x7f00000000c0)=@ethernet={0x0, @local}, &(0x7f0000000040)=0x80, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000001c0)=""/113, &(0x7f0000000240)=0x71) 19:34:51 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000001800)) 19:34:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) seccomp(0x0, 0x0, &(0x7f0000000180)={0xbf34b854c3fe40f0}) socket$inet_tcp(0x2, 0x1, 0x0) 19:34:51 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0)={0x0, {{0xa}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}}, 0x104) 19:34:51 executing program 2: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) time(&(0x7f0000000200)) 19:34:51 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), 0x0) 19:34:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000080), 0x4) 19:34:51 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000000)) [ 906.364042] audit: type=1326 audit(1529696091.362:1961): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24258 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:51 executing program 2: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) time(&(0x7f0000000200)) 19:34:51 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), 0x0) 19:34:51 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0)={0x0, {{0xa}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}}, 0x104) 19:34:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) socket$inet_tcp(0x2, 0x1, 0x0) 19:34:51 executing program 5: accept4(0xffffffffffffff9c, &(0x7f00000000c0)=@ethernet={0x0, @local}, &(0x7f0000000040)=0x80, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000001c0)=""/113, &(0x7f0000000240)=0x71) 19:34:51 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 19:34:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000080), 0x4) 19:34:51 executing program 2: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) time(&(0x7f0000000200)) 19:34:51 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), 0x0) 19:34:52 executing program 5: accept4(0xffffffffffffff9c, &(0x7f00000000c0)=@ethernet={0x0, @local}, &(0x7f0000000040)=0x80, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000001c0)=""/113, &(0x7f0000000240)=0x71) 19:34:52 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) socket$inet_tcp(0x2, 0x1, 0x0) 19:34:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 19:34:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) socketpair(0x0, 0x0, 0x0, &(0x7f00000001c0)) arch_prctl(0x0, &(0x7f0000000100)) 19:34:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000080), 0x4) 19:34:52 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0)={0x0, {{0xa}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}}, 0x104) 19:34:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), 0x0) 19:34:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket$inet_icmp_raw(0x2, 0x3, 0x1) time(&(0x7f0000000200)) 19:34:52 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) socket$inet_tcp(0x2, 0x1, 0x0) 19:34:52 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0)={0x0, {{0xa}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}}, 0x104) 19:34:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), 0x0) 19:34:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket$inet_icmp_raw(0x2, 0x3, 0x1) time(&(0x7f0000000200)) 19:34:52 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) accept4(0xffffffffffffff9c, &(0x7f00000000c0)=@ethernet={0x0, @local}, &(0x7f0000000040)=0x80, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000001c0)=""/113, &(0x7f0000000240)=0x71) 19:34:52 executing program 7: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 19:34:52 executing program 4: ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000080), 0x4) 19:34:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) socketpair(0x0, 0x0, 0x0, &(0x7f00000001c0)) arch_prctl(0x0, &(0x7f0000000100)) 19:34:52 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) accept4(0xffffffffffffff9c, &(0x7f00000000c0)=@ethernet={0x0, @local}, &(0x7f0000000040)=0x80, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000001c0)=""/113, &(0x7f0000000240)=0x71) 19:34:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0)={0x0, {{0xa}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}}, 0x104) 19:34:52 executing program 7: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 19:34:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ed}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), 0x0) 19:34:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket$inet_icmp_raw(0x2, 0x3, 0x1) time(&(0x7f0000000200)) 19:34:52 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000180)={0xbf34b854c3fe40f0}) socket$inet_tcp(0x2, 0x1, 0x0) 19:34:52 executing program 4: ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000080), 0x4) 19:34:52 executing program 7: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 19:34:52 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) accept4(0xffffffffffffff9c, &(0x7f00000000c0)=@ethernet={0x0, @local}, &(0x7f0000000040)=0x80, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000001c0)=""/113, &(0x7f0000000240)=0x71) 19:34:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0)={0x0, {{0xa}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}}, 0x104) 19:34:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) socketpair(0x0, 0x0, 0x0, &(0x7f00000001c0)) arch_prctl(0x0, &(0x7f0000000100)) 19:34:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ed}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), 0x0) 19:34:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) time(&(0x7f0000000200)) 19:34:53 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000180)={0xbf34b854c3fe40f0}) socket$inet_tcp(0x2, 0x1, 0x0) 19:34:53 executing program 7: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 19:34:53 executing program 4: ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000080), 0x4) 19:34:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) accept4(0xffffffffffffff9c, &(0x7f00000000c0)=@ethernet={0x0, @local}, &(0x7f0000000040)=0x80, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000001c0)=""/113, &(0x7f0000000240)=0x71) 19:34:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0)={0x0, {{0xa}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}}, 0x104) 19:34:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) time(&(0x7f0000000200)) 19:34:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) socketpair(0x0, 0x0, 0x0, &(0x7f00000001c0)) arch_prctl(0x0, &(0x7f0000000100)) 19:34:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ed}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), 0x0) 19:34:53 executing program 4: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000080), 0x4) 19:34:53 executing program 7: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 19:34:53 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000180)={0xbf34b854c3fe40f0}) socket$inet_tcp(0x2, 0x1, 0x0) 19:34:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) accept4(0xffffffffffffff9c, &(0x7f00000000c0)=@ethernet={0x0, @local}, &(0x7f0000000040)=0x80, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000001c0)=""/113, &(0x7f0000000240)=0x71) 19:34:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0)={0x0, {{0xa}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}}, 0x104) 19:34:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), 0x0) 19:34:53 executing program 4: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000080), 0x4) 19:34:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) time(&(0x7f0000000200)) 19:34:53 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) seccomp(0x0, 0x0, &(0x7f0000000180)={0xbf34b854c3fe40f0}) socket$inet_tcp(0x2, 0x1, 0x0) 19:34:53 executing program 7: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 19:34:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) arch_prctl(0x0, &(0x7f0000000100)) [ 908.607552] audit: type=1326 audit(1529696093.606:1962): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24417 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) accept4(0xffffffffffffff9c, &(0x7f00000000c0)=@ethernet={0x0, @local}, &(0x7f0000000040)=0x80, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000001c0)=""/113, &(0x7f0000000240)=0x71) 19:34:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0)={0x0, {{0xa}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}}, 0x104) 19:34:53 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) seccomp(0x0, 0x0, &(0x7f0000000180)={0xbf34b854c3fe40f0}) socket$inet_tcp(0x2, 0x1, 0x0) 19:34:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) time(&(0x7f0000000200)) 19:34:53 executing program 4: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000080), 0x4) 19:34:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 19:34:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) arch_prctl(0x0, &(0x7f0000000100)) [ 908.860813] audit: type=1326 audit(1529696093.859:1963): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24443 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) accept4(0xffffffffffffff9c, &(0x7f00000000c0)=@ethernet={0x0, @local}, &(0x7f0000000040)=0x80, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000001c0)=""/113, &(0x7f0000000240)=0x71) 19:34:54 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) seccomp(0x0, 0x0, &(0x7f0000000180)={0xbf34b854c3fe40f0}) socket$inet_tcp(0x2, 0x1, 0x0) 19:34:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0)={0x0, {{0xa}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}}, 0x104) 19:34:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), 0x0) 19:34:54 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000080), 0x4) 19:34:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) accept4(0xffffffffffffff9c, &(0x7f00000000c0)=@ethernet={0x0, @local}, &(0x7f0000000040)=0x80, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000001c0)=""/113, &(0x7f0000000240)=0x71) 19:34:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 19:34:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) arch_prctl(0x0, &(0x7f0000000100)) 19:34:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0)={0x0, {{0xa}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}}, 0x104) 19:34:54 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000180)={0xbf34b854c3fe40f0}) socket$inet_tcp(0x2, 0x1, 0x0) [ 909.540410] audit: type=1326 audit(1529696094.539:1964): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24473 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:54 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000080), 0x4) 19:34:54 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000180)={0xbf34b854c3fe40f0}) socket$inet_tcp(0x2, 0x1, 0x0) [ 909.620399] audit: type=1326 audit(1529696094.614:1965): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24482 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) time(&(0x7f0000000200)) 19:34:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 19:34:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) accept4(0xffffffffffffff9c, &(0x7f00000000c0)=@ethernet={0x0, @local}, &(0x7f0000000040)=0x80, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000001c0)=""/113, &(0x7f0000000240)=0x71) 19:34:54 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000180)={0xbf34b854c3fe40f0}) socket$inet_tcp(0x2, 0x1, 0x0) 19:34:54 executing program 0: socketpair(0x0, 0x0, 0x0, &(0x7f00000001c0)) arch_prctl(0x0, &(0x7f0000000100)) 19:34:54 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000080), 0x4) 19:34:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000000)) [ 909.903455] audit: type=1326 audit(1529696094.901:1966): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24508 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:55 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), 0x0) 19:34:55 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023d}]}) seccomp(0x0, 0x0, &(0x7f0000000180)={0xbf34b854c3fe40f0}) socket$inet_tcp(0x2, 0x1, 0x0) 19:34:55 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000080), 0x4) 19:34:55 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) accept4(0xffffffffffffff9c, &(0x7f00000000c0)=@ethernet={0x0, @local}, &(0x7f0000000040)=0x80, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000001c0)=""/113, &(0x7f0000000240)=0x71) 19:34:55 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 19:34:55 executing program 0: socketpair(0x0, 0x0, 0x0, &(0x7f00000001c0)) arch_prctl(0x0, &(0x7f0000000100)) 19:34:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0)={0x0, {{0xa}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}}, 0x104) 19:34:55 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023d}]}) seccomp(0x0, 0x0, &(0x7f0000000180)={0xbf34b854c3fe40f0}) socket$inet_tcp(0x2, 0x1, 0x0) 19:34:55 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000080), 0x4) [ 910.549125] audit: type=1326 audit(1529696095.547:1968): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24524 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 910.569125] audit: type=1326 audit(1529696095.547:1967): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24527 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 910.692704] audit: type=1326 audit(1529696095.601:1969): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24535 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) time(&(0x7f0000000200)) 19:34:55 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 19:34:55 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023d}]}) seccomp(0x0, 0x0, &(0x7f0000000180)={0xbf34b854c3fe40f0}) socket$inet_tcp(0x2, 0x1, 0x0) 19:34:55 executing program 0: socketpair(0x0, 0x0, 0x0, &(0x7f00000001c0)) arch_prctl(0x0, &(0x7f0000000100)) 19:34:55 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000080), 0x4) 19:34:55 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000180)={0xbf34b854c3fe40f0}) socket$inet_tcp(0x2, 0x1, 0x0) [ 910.862509] audit: type=1326 audit(1529696095.860:1970): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24557 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:55 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000000)) [ 910.955571] audit: type=1326 audit(1529696095.935:1971): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24561 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0)={0x0, {{0xa}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}}, 0x104) 19:34:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000080), 0x4) 19:34:56 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) socketpair(0x0, 0x0, 0x0, &(0x7f00000001c0)) arch_prctl(0x0, &(0x7f0000000100)) 19:34:56 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) accept4(0xffffffffffffff9c, &(0x7f00000000c0)=@ethernet={0x0, @local}, &(0x7f0000000040)=0x80, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000001c0)=""/113, &(0x7f0000000240)=0x71) 19:34:56 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) add_key(&(0x7f0000000100)='id_resolver\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x269, 0xfffffffffffffff8) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) 19:34:56 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) socketpair(0x0, 0x0, 0x0, &(0x7f00000001c0)) arch_prctl(0x0, &(0x7f0000000100)) 19:34:56 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000000050241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000100)='/dev/md0\x00', 0x0, 0x0) 19:34:56 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) socketpair(0x0, 0x0, 0x0, &(0x7f00000001c0)) arch_prctl(0x0, &(0x7f0000000100)) 19:34:56 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000080)={0x0, 0x1, 0x6, @random="5c7bd80eaae0"}, 0x10) 19:34:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000180)={0xbf34b854c3fe40f0}) socket$inet_tcp(0x2, 0x1, 0x0) 19:34:56 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 19:34:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000000050241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000100)='/dev/md0\x00', 0x0, 0x0) 19:34:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) socketpair(0x0, 0x0, 0x0, &(0x7f00000001c0)) arch_prctl(0x0, &(0x7f0000000100)) 19:34:57 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000080)={0x0, 0x1, 0x6, @random="5c7bd80eaae0"}, 0x10) 19:34:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) socketpair(0x0, 0x0, 0x0, &(0x7f00000001c0)) arch_prctl(0x0, &(0x7f0000000100)) 19:34:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000000050241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000100)='/dev/md0\x00', 0x0, 0x0) 19:34:57 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000080)={0x0, 0x1, 0x6, @random="5c7bd80eaae0"}, 0x10) 19:34:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000080), 0x4) 19:34:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) socketpair(0x0, 0x0, 0x0, &(0x7f00000001c0)) arch_prctl(0x0, &(0x7f0000000100)) 19:34:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000000050241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000100)='/dev/md0\x00', 0x0, 0x0) 19:34:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e9}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000340)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, [], {0x77359400}}) 19:34:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) accept4(0xffffffffffffff9c, &(0x7f00000000c0)=@ethernet={0x0, @local}, &(0x7f0000000040)=0x80, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000001c0)=""/113, &(0x7f0000000240)=0x71) 19:34:57 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000080)={0x0, 0x1, 0x6, @random="5c7bd80eaae0"}, 0x10) 19:34:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50343}]}) socketpair(0x0, 0x0, 0x0, &(0x7f00000001c0)) arch_prctl(0x0, &(0x7f0000000100)) 19:34:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e9}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000340)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, [], {0x77359400}}) 19:34:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000180)={0xbf34b854c3fe40f0}) socket$inet_tcp(0x2, 0x1, 0x0) 19:34:57 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 19:34:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000000050241}]}) openat$md(0xffffffffffffff9c, &(0x7f0000000100)='/dev/md0\x00', 0x0, 0x0) 19:34:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50343}]}) socketpair(0x0, 0x0, 0x0, &(0x7f00000001c0)) arch_prctl(0x0, &(0x7f0000000100)) 19:34:57 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000080)={0x0, 0x1, 0x6, @random="5c7bd80eaae0"}, 0x10) 19:34:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e9}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000340)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, [], {0x77359400}}) 19:34:58 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000080)={0x0, 0x1, 0x6, @random="5c7bd80eaae0"}, 0x10) 19:34:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50343}]}) socketpair(0x0, 0x0, 0x0, &(0x7f00000001c0)) arch_prctl(0x0, &(0x7f0000000100)) 19:34:58 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000080), 0x4) 19:34:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e9}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000340)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, [], {0x77359400}}) 19:34:58 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000080)={0x0, 0x1, 0x6, @random="5c7bd80eaae0"}, 0x10) 19:34:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000000050241}]}) openat$md(0xffffffffffffff9c, &(0x7f0000000100)='/dev/md0\x00', 0x0, 0x0) 19:34:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f00000001c0)) arch_prctl(0x0, &(0x7f0000000100)) 19:34:58 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)={0x27e}) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000100)=""/99) 19:34:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e9}]}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000340)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, [], {0x77359400}}) 19:34:58 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000080)={0x0, 0x1, 0x6, @random="5c7bd80eaae0"}, 0x10) 19:34:58 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)={0x27e}) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000100)=""/99) 19:34:58 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)={0x27e}) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000100)=""/99) 19:34:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000000050241}]}) openat$md(0xffffffffffffff9c, &(0x7f0000000100)='/dev/md0\x00', 0x0, 0x0) 19:34:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e9}]}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000340)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, [], {0x77359400}}) 19:34:58 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000080)={0x0, 0x1, 0x6, @random="5c7bd80eaae0"}, 0x10) 19:34:58 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) eventfd2(0x0, 0x0) 19:34:59 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000000)={'bond_slave_1\x00'}) 19:34:59 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) eventfd2(0x0, 0x0) 19:34:59 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) eventfd2(0x0, 0x0) 19:34:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e9}]}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000340)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, [], {0x77359400}}) 19:34:59 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000080)={0x0, 0x1, 0x6, @random="5c7bd80eaae0"}, 0x10) 19:34:59 executing program 6: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000100)='/dev/md0\x00', 0x0, 0x0) 19:34:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f00000001c0)) arch_prctl(0x0, &(0x7f0000000100)) 19:34:59 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)={0x27e}) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000100)=""/99) 19:34:59 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000100)) 19:34:59 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000280)) 19:34:59 executing program 6: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000100)='/dev/md0\x00', 0x0, 0x0) 19:34:59 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) eventfd2(0x0, 0x0) 19:34:59 executing program 2: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000080)={0x0, 0x1, 0x6, @random="5c7bd80eaae0"}, 0x10) [ 914.591775] kauditd_printk_skb: 12 callbacks suppressed [ 914.591797] audit: type=1326 audit(1529696099.590:1984): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24766 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:34:59 executing program 3: openat$hwrng(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000340)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, [], {0x77359400}}) 19:34:59 executing program 6: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000100)='/dev/md0\x00', 0x0, 0x0) 19:34:59 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000100)=""/99) 19:34:59 executing program 2: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000080)={0x0, 0x1, 0x6, @random="5c7bd80eaae0"}, 0x10) 19:34:59 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000100)) 19:34:59 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000280)) 19:34:59 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) eventfd2(0x0, 0x0) 19:34:59 executing program 3: openat$hwrng(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000340)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, [], {0x77359400}}) 19:35:00 executing program 2: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000080)={0x0, 0x1, 0x6, @random="5c7bd80eaae0"}, 0x10) 19:35:00 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f00000001c0)) arch_prctl(0x0, &(0x7f0000000100)) 19:35:00 executing program 6: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000000050241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000100)='/dev/md0\x00', 0x0, 0x0) 19:35:00 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000100)=""/99) 19:35:00 executing program 3: openat$hwrng(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000340)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, [], {0x77359400}}) 19:35:00 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000280)) 19:35:00 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000100)) 19:35:00 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) eventfd2(0x0, 0x0) 19:35:00 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000080)={0x0, 0x1, 0x6, @random="5c7bd80eaae0"}, 0x10) [ 915.597779] audit: type=1326 audit(1529696100.596:1985): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24831 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:35:00 executing program 6: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000000050241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000100)='/dev/md0\x00', 0x0, 0x0) 19:35:00 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000080)={0x0, 0x1, 0x6, @random="5c7bd80eaae0"}, 0x10) 19:35:00 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e9}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000340)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, [], {0x77359400}}) 19:35:00 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000100)=""/99) 19:35:00 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000280)) 19:35:00 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000100)) 19:35:00 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) eventfd2(0x0, 0x0) 19:35:00 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000080)={0x0, 0x1, 0x6, @random="5c7bd80eaae0"}, 0x10) 19:35:01 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000080)={0x0, 0x1, 0x6, @random="5c7bd80eaae0"}, 0x10) 19:35:01 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e9}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000340)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, [], {0x77359400}}) 19:35:01 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000040)={0x27e}) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000100)=""/99) 19:35:01 executing program 7: openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) eventfd2(0x0, 0x0) 19:35:01 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000040)={0x27e}) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000100)=""/99) 19:35:01 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) syz_open_procfs(0x0, &(0x7f00000001c0)='fdinfo/4\x00') openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) 19:35:01 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000100)) 19:35:01 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e9}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000340)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, [], {0x77359400}}) 19:35:01 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000080)={0x0, 0x1, 0x6, @random="5c7bd80eaae0"}, 0x10) 19:35:01 executing program 6: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000000050241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000100)='/dev/md0\x00', 0x0, 0x0) 19:35:01 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000280)) 19:35:01 executing program 7: openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) eventfd2(0x0, 0x0) 19:35:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000340)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, [], {0x77359400}}) 19:35:02 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000040)={0x27e}) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000100)=""/99) 19:35:02 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000100)) 19:35:02 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000280)) 19:35:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f0000000080)}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000100)='/dev/md0\x00', 0x0, 0x0) 19:35:02 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000080)={0x0, 0x1, 0x6, @random="5c7bd80eaae0"}, 0x10) 19:35:02 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) syz_open_procfs(0x0, &(0x7f00000001c0)='fdinfo/4\x00') openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) 19:35:02 executing program 7: openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) eventfd2(0x0, 0x0) 19:35:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000340)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, [], {0x77359400}}) 19:35:02 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)={0x27e}) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000100)=""/99) 19:35:02 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000280)) 19:35:02 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000100)) 19:35:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f0000000080)}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000100)='/dev/md0\x00', 0x0, 0x0) 19:35:02 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000080)={0x0, 0x1, 0x6, @random="5c7bd80eaae0"}, 0x10) 19:35:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000340)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, [], {0x77359400}}) 19:35:02 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)={0x27e}) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000100)=""/99) 19:35:02 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) eventfd2(0x0, 0x0) [ 917.598857] audit: type=1326 audit(1529696102.596:1986): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24935 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:35:02 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) syz_open_procfs(0x0, &(0x7f00000001c0)='fdinfo/4\x00') openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) 19:35:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f0000000080)}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000100)='/dev/md0\x00', 0x0, 0x0) 19:35:02 executing program 4: openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000100)) 19:35:02 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000280)) 19:35:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e9}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000340)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, [], {0x77359400}}) 19:35:02 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)={0x27e}) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000100)=""/99) 19:35:02 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) eventfd2(0x0, 0x0) 19:35:02 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) syz_open_procfs(0x0, &(0x7f00000001c0)='fdinfo/4\x00') openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) 19:35:03 executing program 4: openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000100)) 19:35:03 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e9}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000340)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, [], {0x77359400}}) 19:35:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000000050241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000100)='/dev/md0\x00', 0x0, 0x0) 19:35:03 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000280)) 19:35:03 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000080)={0x0, 0x1, 0x6, @random="5c7bd80eaae0"}, 0x10) 19:35:03 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) eventfd2(0x0, 0x0) 19:35:03 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)={0x27e}) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000100)=""/99) 19:35:03 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) 19:35:03 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000280)) 19:35:03 executing program 4: openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000100)) 19:35:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000000050241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000100)='/dev/md0\x00', 0x0, 0x0) 19:35:03 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e9}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000340)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, [], {0x77359400}}) [ 918.591189] audit: type=1326 audit(1529696103.589:1987): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25001 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:35:03 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) eventfd2(0x0, 0x0) 19:35:03 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000280)) 19:35:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000000050241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000100)='/dev/md0\x00', 0x0, 0x0) 19:35:03 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000100)) 19:35:03 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)={0x27e}) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000100)=""/99) 19:35:03 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) 19:35:03 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000340)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, [], {0x77359400}}) [ 918.908154] audit: type=1326 audit(1529696103.906:1988): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25026 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:35:03 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000100)) 19:35:04 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000080)={0x0, 0x1, 0x6, @random="5c7bd80eaae0"}, 0x10) 19:35:04 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000280)) 19:35:04 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)={0x27e}) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000100)=""/99) 19:35:04 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) eventfd2(0x0, 0x0) 19:35:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000100)='/dev/md0\x00', 0x0, 0x0) 19:35:04 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) 19:35:04 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000100)) [ 919.544492] audit: type=1326 audit(1529696104.536:1989): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25040 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:35:04 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000100)) 19:35:04 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) eventfd2(0x0, 0x0) 19:35:04 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000280)) [ 919.608285] audit: type=1326 audit(1529696104.586:1990): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25051 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:35:04 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)={0x27e}) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000100)=""/99) 19:35:04 executing program 0: syz_open_procfs(0x0, &(0x7f00000001c0)='fdinfo/4\x00') openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) 19:35:04 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000100)) 19:35:04 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)={0x27e}) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000100)=""/99) 19:35:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000340)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, [], {0x77359400}}) 19:35:04 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) eventfd2(0x0, 0x0) [ 919.988656] audit: type=1326 audit(1529696104.987:1991): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25078 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:35:05 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000100)='/dev/md0\x00', 0x0, 0x0) 19:35:05 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000280)) 19:35:05 executing program 0: syz_open_procfs(0x0, &(0x7f00000001c0)='fdinfo/4\x00') openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) 19:35:05 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000100)) 19:35:05 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 19:35:05 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)={0x27e}) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000100)=""/99) 19:35:05 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) eventfd2(0x0, 0x0) [ 920.526976] audit: type=1326 audit(1529696105.525:1992): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25098 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:35:05 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) eventfd2(0x0, 0x0) 19:35:05 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)={0x27e}) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000100)=""/99) 19:35:05 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000100)) 19:35:05 executing program 0: syz_open_procfs(0x0, &(0x7f00000001c0)='fdinfo/4\x00') openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) 19:35:05 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000280)) [ 920.682920] audit: type=1326 audit(1529696105.681:1993): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25108 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:35:05 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) eventfd2(0x0, 0x0) 19:35:05 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) [ 920.901328] audit: type=1326 audit(1529696105.899:1994): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25122 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:35:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000340)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, [], {0x77359400}}) 19:35:05 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000100)) [ 921.011879] audit: type=1326 audit(1529696106.010:1995): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25132 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:35:06 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000100)='/dev/md0\x00', 0x0, 0x0) 19:35:06 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) syz_open_procfs(0x0, &(0x7f00000001c0)='fdinfo/4\x00') openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) 19:35:06 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000100)) 19:35:06 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000280)) 19:35:06 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) [ 921.496578] audit: type=1326 audit(1529696106.495:1996): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25139 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:35:06 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000100)) 19:35:06 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) syz_open_procfs(0x0, &(0x7f00000001c0)='fdinfo/4\x00') openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) 19:35:06 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000280)) 19:35:06 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)={0x27e}) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000100)=""/99) 19:35:06 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) [ 921.657568] audit: type=1326 audit(1529696106.650:1997): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25154 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:35:06 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) syz_open_procfs(0x0, &(0x7f00000001c0)='fdinfo/4\x00') openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) [ 921.760669] audit: type=1326 audit(1529696106.757:1998): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25162 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:35:06 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000280)) 19:35:06 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) eventfd2(0x0, 0x0) 19:35:06 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) [ 921.946842] audit: type=1326 audit(1529696106.945:1999): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25174 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:35:07 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) syz_open_procfs(0x0, &(0x7f00000001c0)='fdinfo/4\x00') openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) 19:35:07 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) [ 922.196377] mmap: syz-executor3 (25187) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.txt. 19:35:07 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) syz_open_procfs(0x0, &(0x7f00000001c0)='fdinfo/4\x00') openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) 19:35:07 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000280)) 19:35:07 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 19:35:07 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) 19:35:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50208}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) 19:35:07 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) syz_open_procfs(0x0, &(0x7f00000001c0)='fdinfo/4\x00') openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) 19:35:07 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000100)) 19:35:07 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 19:35:07 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000280)) 19:35:07 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)={0x27e}) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000100)=""/99) 19:35:07 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) 19:35:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x10006, 0x0, 0x0, 0x2000000501f8}]}) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 19:35:07 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) eventfd2(0x0, 0x0) 19:35:07 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000040)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 19:35:07 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) syz_open_procfs(0x0, &(0x7f00000001c0)='fdinfo/4\x00') openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) 19:35:07 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) 19:35:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) prctl$getname(0x10, &(0x7f0000000240)=""/188) 19:35:08 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000040)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 19:35:08 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) syz_open_procfs(0x0, &(0x7f00000001c0)='fdinfo/4\x00') openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) 19:35:08 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) 19:35:08 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) syz_open_procfs(0x0, &(0x7f00000001c0)='fdinfo/4\x00') openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) 19:35:08 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000040)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 19:35:08 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000100)) 19:35:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) prctl$getname(0x10, &(0x7f0000000240)=""/188) 19:35:08 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000280)) 19:35:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) prctl$getname(0x10, &(0x7f0000000240)=""/188) 19:35:08 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) syz_open_procfs(0x0, &(0x7f00000001c0)='fdinfo/4\x00') openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) 19:35:08 executing program 2: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 19:35:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) prctl$getname(0x10, &(0x7f0000000240)=""/188) 19:35:08 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) 19:35:08 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000000)=""/45) 19:35:08 executing program 2: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 19:35:08 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast2={0xff, 0x2, [], 0x1}}) 19:35:09 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) 19:35:09 executing program 2: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 19:35:09 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000000)=""/45) 19:35:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) prctl$getname(0x10, &(0x7f0000000240)=""/188) 19:35:09 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast2={0xff, 0x2, [], 0x1}}) 19:35:09 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast2={0xff, 0x2, [], 0x1}}) 19:35:09 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 19:35:09 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000280)) 19:35:09 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) 19:35:09 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) syz_open_procfs(0x0, &(0x7f00000001c0)='fdinfo/4\x00') openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) 19:35:09 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000000)=""/45) 19:35:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) prctl$getname(0x10, &(0x7f0000000240)=""/188) 19:35:09 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f00000001c0)) 19:35:09 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 19:35:09 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast2={0xff, 0x2, [], 0x1}}) [ 924.768787] kauditd_printk_skb: 7 callbacks suppressed [ 924.768808] audit: type=1326 audit(1529696109.767:2007): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25329 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:35:09 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) [ 924.902746] audit: type=1326 audit(1529696109.839:2008): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25341 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:35:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) prctl$getname(0x10, &(0x7f0000000240)=""/188) 19:35:09 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000000)=""/45) 19:35:09 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 19:35:10 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f00000001c0)) 19:35:10 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast2={0xff, 0x2, [], 0x1}}) 19:35:10 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) 19:35:10 executing program 6: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) prctl$getname(0x10, &(0x7f0000000240)=""/188) 19:35:10 executing program 6: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) prctl$getname(0x10, &(0x7f0000000240)=""/188) 19:35:10 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 19:35:10 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) syz_open_procfs(0x0, &(0x7f00000001c0)='fdinfo/4\x00') openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) 19:35:10 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000000)=""/45) 19:35:10 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast2={0xff, 0x2, [], 0x1}}) 19:35:10 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f00000001c0)) 19:35:10 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) 19:35:10 executing program 6: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) prctl$getname(0x10, &(0x7f0000000240)=""/188) 19:35:10 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) [ 925.857603] audit: type=1326 audit(1529696110.856:2009): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25398 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:35:10 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) prctl$getname(0x10, &(0x7f0000000240)=""/188) 19:35:10 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) 19:35:10 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 19:35:10 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000000)=""/45) 19:35:10 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast2={0xff, 0x2, [], 0x1}}) 19:35:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f00000001c0)) 19:35:11 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) 19:35:11 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) prctl$getname(0x10, &(0x7f0000000240)=""/188) 19:35:11 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) [ 926.288212] audit: type=1326 audit(1529696111.286:2010): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25427 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:35:11 executing program 7: socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast2={0xff, 0x2, [], 0x1}}) 19:35:11 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000000)=""/45) 19:35:11 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket$inet_icmp_raw(0x2, 0x3, 0x1) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) 19:35:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f00000001c0)) 19:35:11 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) prctl$getname(0x10, &(0x7f0000000240)=""/188) 19:35:11 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket$inet_icmp_raw(0x2, 0x3, 0x1) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) 19:35:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) prctl$getname(0x10, &(0x7f0000000240)=""/188) 19:35:11 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 19:35:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000000), 0x4) 19:35:11 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000000)=""/45) 19:35:11 executing program 7: socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast2={0xff, 0x2, [], 0x1}}) 19:35:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f00000001c0)) 19:35:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) prctl$getname(0x10, &(0x7f0000000240)=""/188) 19:35:12 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket$inet_icmp_raw(0x2, 0x3, 0x1) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) 19:35:12 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000000)=""/45) 19:35:12 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 19:35:12 executing program 7: socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast2={0xff, 0x2, [], 0x1}}) 19:35:12 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 19:35:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000000), 0x4) 19:35:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f00000001c0)) 19:35:12 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) 19:35:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) prctl$getname(0x10, &(0x7f0000000240)=""/188) 19:35:12 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000000)=""/45) [ 927.438265] audit: type=1326 audit(1529696112.436:2011): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25488 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:35:12 executing program 4: getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f00000001c0)) 19:35:12 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast2={0xff, 0x2, [], 0x1}}) 19:35:12 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) 19:35:12 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 19:35:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501cd}]}) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) prctl$getname(0x10, &(0x7f0000000240)=""/188) 19:35:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000000), 0x4) 19:35:12 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000000)=""/45) 19:35:12 executing program 4: getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f00000001c0)) 19:35:13 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 19:35:13 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) 19:35:13 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast2={0xff, 0x2, [], 0x1}}) 19:35:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501cd}]}) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) prctl$getname(0x10, &(0x7f0000000240)=""/188) 19:35:13 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 19:35:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000000), 0x4) 19:35:13 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000000)=""/45) 19:35:13 executing program 4: getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f00000001c0)) [ 928.336943] audit: type=1326 audit(1529696113.335:2012): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25532 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:35:13 executing program 4: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f00000001c0)) 19:35:13 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast2={0xff, 0x2, [], 0x1}}) 19:35:13 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000000)=""/45) 19:35:13 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) 19:35:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501cd}]}) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) prctl$getname(0x10, &(0x7f0000000240)=""/188) 19:35:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000000), 0x4) [ 928.573471] audit: type=1326 audit(1529696113.571:2013): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25553 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:35:13 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 19:35:13 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast2={0xff, 0x2, [], 0x1}}) 19:35:14 executing program 4: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f00000001c0)) 19:35:14 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000000)=""/45) 19:35:14 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) prctl$getname(0x10, &(0x7f0000000240)=""/188) 19:35:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000000), 0x4) 19:35:14 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 19:35:14 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast2={0xff, 0x2, [], 0x1}}) 19:35:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) memfd_create(&(0x7f00000001c0)='\x00', 0x0) [ 929.271264] audit: type=1326 audit(1529696114.269:2014): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25582 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:35:14 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 19:35:14 executing program 4: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f00000001c0)) 19:35:14 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast2={0xff, 0x2, [], 0x1}}) 19:35:14 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000000)=""/45) 19:35:14 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) 19:35:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000000), 0x4) 19:35:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) memfd_create(&(0x7f00000001c0)='\x00', 0x0) 19:35:14 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f00000001c0)) 19:35:14 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 19:35:14 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast2={0xff, 0x2, [], 0x1}}) 19:35:14 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000000)=""/45) 19:35:15 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) prctl$getname(0x10, &(0x7f0000000240)=""/188) 19:35:15 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000000), 0x4) 19:35:15 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f00000001c0)) 19:35:15 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 19:35:15 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000000)=""/45) 19:35:15 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast2={0xff, 0x2, [], 0x1}}) 19:35:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) memfd_create(&(0x7f00000001c0)='\x00', 0x0) 19:35:15 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000000), 0x4) 19:35:15 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast2={0xff, 0x2, [], 0x1}}) 19:35:15 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) 19:35:15 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f00000001c0)) 19:35:15 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000000)=""/45) 19:35:15 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 19:35:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) memfd_create(&(0x7f00000001c0)='\x00', 0x0) 19:35:15 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast2={0xff, 0x2, [], 0x1}}) 19:35:15 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000000), 0x4) 19:35:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f00000001c0)) 19:35:16 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000000)=""/45) 19:35:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) memfd_create(&(0x7f00000001c0)='\x00', 0x0) 19:35:16 executing program 0: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 19:35:16 executing program 1: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000000), 0x4) 19:35:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) prctl$getname(0x10, &(0x7f0000000240)=""/188) 19:35:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f00000001c0)) 19:35:16 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000000)=""/45) 19:35:16 executing program 0: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 19:35:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) memfd_create(&(0x7f00000001c0)='\x00', 0x0) 19:35:16 executing program 1: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000000), 0x4) 19:35:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f00000001c0)) 19:35:16 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast2={0xff, 0x2, [], 0x1}}) 19:35:16 executing program 0: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 19:35:16 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) utimes(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={{0x77359400}}) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000180), 0x4) 19:35:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f00000001c0)) 19:35:16 executing program 1: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000000), 0x4) 19:35:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) memfd_create(&(0x7f00000001c0)='\x00', 0x0) 19:35:16 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 19:35:16 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) utimes(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={{0x77359400}}) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000180), 0x4) 19:35:17 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 19:35:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000000), 0x4) 19:35:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x10006, 0x0, 0x0, 0x2000000501f8}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) 19:35:17 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000000)=""/45) 19:35:17 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) utimes(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={{0x77359400}}) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000180), 0x4) 19:35:17 executing program 2: mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) memfd_create(&(0x7f00000001c0)='\x00', 0x0) 19:35:17 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 19:35:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000000), 0x4) 19:35:17 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast2={0xff, 0x2, [], 0x1}}) 19:35:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x10006, 0x0, 0x0, 0x2000000501f8}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) 19:35:17 executing program 2: mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) memfd_create(&(0x7f00000001c0)='\x00', 0x0) 19:35:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f00000001c0)) 19:35:17 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 19:35:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000000), 0x4) 19:35:17 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) utimes(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={{0x77359400}}) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000180), 0x4) 19:35:17 executing program 2: mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) memfd_create(&(0x7f00000001c0)='\x00', 0x0) 19:35:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x10006, 0x0, 0x0, 0x2000000501f8}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) 19:35:17 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 19:35:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000000), 0x4) 19:35:18 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000180), 0x4) 19:35:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000000), 0x4) 19:35:18 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) memfd_create(&(0x7f00000001c0)='\x00', 0x0) 19:35:18 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000000)=""/45) 19:35:18 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 19:35:18 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000180), 0x4) 19:35:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x10006, 0x0, 0x0, 0x2000000501f8}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) 19:35:18 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 19:35:18 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000180), 0x4) 19:35:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000000), 0x4) 19:35:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x10006, 0x0, 0x0, 0x2000000501f8}]}) read$eventfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) 19:35:18 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) memfd_create(&(0x7f00000001c0)='\x00', 0x0) 19:35:18 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f00000001c0)) 19:35:18 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) memfd_create(&(0x7f00000001c0)='\x00', 0x0) 19:35:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x10006, 0x0, 0x0, 0x2000000501f8}]}) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000280)={0x0, @time}) 19:35:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000000), 0x4) 19:35:19 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x10006, 0x0, 0x0, 0x2000000501f8}]}) read$eventfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) 19:35:19 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x10006, 0x0, 0x0, 0x2000000501f8}]}) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000280)={0x0, @time}) 19:35:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) memfd_create(&(0x7f00000001c0)='\x00', 0x0) 19:35:19 executing program 3: utimes(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={{0x77359400}}) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000180), 0x4) 19:35:19 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setns(0xffffffffffffffff, 0x0) 19:35:19 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x10006, 0x0, 0x0, 0x2000000501f8}]}) read$eventfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) 19:35:19 executing program 3: utimes(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={{0x77359400}}) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000180), 0x4) 19:35:19 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 19:35:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) memfd_create(&(0x7f00000001c0)='\x00', 0x0) 19:35:19 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x10006, 0x0, 0x0, 0x2000000501f8}]}) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000280)={0x0, @time}) 19:35:19 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setns(0xffffffffffffffff, 0x0) 19:35:19 executing program 3: utimes(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={{0x77359400}}) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000180), 0x4) 19:35:19 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) utimes(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={{0x77359400}}) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000180), 0x4) 19:35:19 executing program 6: openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) 19:35:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) memfd_create(&(0x7f00000001c0)='\x00', 0x0) 19:35:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000000), 0x4) 19:35:19 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x10006, 0x0, 0x0, 0x2000000501f8}]}) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000280)={0x0, @time}) 19:35:19 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) arch_prctl(0x0, &(0x7f0000000180)) 19:35:19 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setns(0xffffffffffffffff, 0x0) 19:35:19 executing program 6: openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) 19:35:19 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) utimes(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={{0x77359400}}) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000180), 0x4) 19:35:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501cd}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) memfd_create(&(0x7f00000001c0)='\x00', 0x0) 19:35:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501cd}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) memfd_create(&(0x7f00000001c0)='\x00', 0x0) 19:35:20 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x10006, 0x0, 0x0, 0x2000000501f8}]}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000280)={0x0, @time}) 19:35:20 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) utimes(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={{0x77359400}}) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000180), 0x4) 19:35:20 executing program 6: openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) 19:35:20 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setns(0xffffffffffffffff, 0x0) [ 929.643029] audit: type=1326 audit(1529696114.641:2015): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25612 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 930.263457] audit: type=1326 audit(1529696115.261:2016): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25648 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 930.574762] audit: type=1326 audit(1529696115.572:2017): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25665 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 930.638302] audit: type=1326 audit(1529696115.615:2018): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25677 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 931.256134] audit: type=1326 audit(1529696116.254:2019): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25692 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 931.380020] audit: type=1326 audit(1529696116.378:2020): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25701 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 931.628621] audit: type=1326 audit(1529696116.627:2021): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25722 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 931.767660] audit: type=1326 audit(1529696116.766:2022): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25726 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 932.364981] audit: type=1326 audit(1529696117.363:2023): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25767 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 932.602151] audit: type=1326 audit(1529696117.600:2024): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25781 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 932.757682] audit: type=1326 audit(1529696117.756:2025): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25793 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:35:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) 19:35:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501cd}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) memfd_create(&(0x7f00000001c0)='\x00', 0x0) 19:35:20 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) [ 935.614499] kauditd_printk_skb: 6 callbacks suppressed [ 935.614522] audit: type=1326 audit(1529696120.613:2032): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25949 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:35:20 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) utimes(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={{0x77359400}}) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000180), 0x4) 19:35:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000000), 0x4) 19:35:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) memfd_create(&(0x7f00000001c0)='\x00', 0x0) 19:35:20 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x10006, 0x0, 0x0, 0x2000000501f8}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) 19:35:20 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) setns(0xffffffffffffffff, 0x0) 19:35:20 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x10006, 0x0, 0x0, 0x2000000501f8}]}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000280)={0x0, @time}) 19:35:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) 19:35:20 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) utimes(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={{0x77359400}}) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000180), 0x4) [ 935.980204] audit: type=1326 audit(1529696120.978:2033): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25968 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 936.032213] audit: type=1326 audit(1529696121.024:2034): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25976 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:35:21 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x10006, 0x0, 0x0, 0x2000000501f8}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) 19:35:21 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) utimes(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={{0x77359400}}) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000180), 0x4) 19:35:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) 19:35:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) setns(0xffffffffffffffff, 0x0) 19:35:21 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x10006, 0x0, 0x0, 0x2000000501f8}]}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000280)={0x0, @time}) 19:35:21 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x10006, 0x0, 0x0, 0x2000000501f8}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) 19:35:21 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) utimes(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={{0x77359400}}) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000180), 0x4) 19:35:21 executing program 7: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000280)={0x0, @time}) 19:35:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) 19:35:21 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) utimes(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={{0x77359400}}) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000180), 0x4) 19:35:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) setns(0xffffffffffffffff, 0x0) 19:35:21 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000480)={0x0, &(0x7f0000000080)}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) 19:35:21 executing program 7: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000280)={0x0, @time}) 19:35:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) memfd_create(&(0x7f00000001c0)='\x00', 0x0) 19:35:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) 19:35:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000400)={0x5, 0x10, 0xfa00, {&(0x7f0000000180)}}, 0x18) 19:35:21 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e9}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000002c0), &(0x7f0000000300)=0x8) [ 936.990488] audit: type=1326 audit(1529696121.989:2035): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26025 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:35:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000480)={0x0, &(0x7f0000000080)}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) 19:35:22 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) utimes(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={{0x77359400}}) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000180), 0x4) 19:35:22 executing program 7: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000280)={0x0, @time}) 19:35:22 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setns(0xffffffffffffffff, 0x0) 19:35:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) 19:35:22 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e9}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000002c0), &(0x7f0000000300)=0x8) 19:35:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000400)={0x5, 0x10, 0xfa00, {&(0x7f0000000180)}}, 0x18) 19:35:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000480)={0x0, &(0x7f0000000080)}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) 19:35:22 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) utimes(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={{0x77359400}}) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000180), 0x4) 19:35:22 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setns(0xffffffffffffffff, 0x0) 19:35:22 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x10006, 0x0, 0x0, 0x2000000501f8}]}) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000280)={0x0, @time}) [ 937.483317] audit: type=1326 audit(1529696122.482:2036): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26064 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:35:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) 19:35:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) 19:35:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) memfd_create(&(0x7f00000001c0)='\x00', 0x0) 19:35:22 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e9}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000002c0), &(0x7f0000000300)=0x8) 19:35:22 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x10006, 0x0, 0x0, 0x2000000501f8}]}) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000280)={0x0, @time}) 19:35:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000400)={0x5, 0x10, 0xfa00, {&(0x7f0000000180)}}, 0x18) 19:35:22 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setns(0xffffffffffffffff, 0x0) 19:35:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) 19:35:22 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) [ 937.968864] audit: type=1326 audit(1529696122.967:2037): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26094 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:35:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) 19:35:23 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setns(0xffffffffffffffff, 0x0) 19:35:23 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) 19:35:23 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x10006, 0x0, 0x0, 0x2000000501f8}]}) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000280)={0x0, @time}) 19:35:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x10006}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) 19:35:23 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e9}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000002c0), &(0x7f0000000300)=0x8) 19:35:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000400)={0x5, 0x10, 0xfa00, {&(0x7f0000000180)}}, 0x18) 19:35:23 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) 19:35:23 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) utimes(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={{0x77359400}}) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000180), 0x4) [ 938.431639] audit: type=1326 audit(1529696123.430:2038): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26119 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 938.487188] audit: type=1326 audit(1529696123.467:2039): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26116 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:35:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000480)={0x0, &(0x7f0000000080)}) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000280)={0x0, @time}) 19:35:23 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setns(0xffffffffffffffff, 0x0) 19:35:23 executing program 4: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) 19:35:23 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e9}]}) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000002c0), &(0x7f0000000300)=0x8) 19:35:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000400)={0x5, 0x10, 0xfa00, {&(0x7f0000000180)}}, 0x18) 19:35:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x200000050178}]}) socket$inet(0x2, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040), 0x0) 19:35:24 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setns(0xffffffffffffffff, 0x0) 19:35:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000480)={0x0, &(0x7f0000000080)}) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000280)={0x0, @time}) 19:35:24 executing program 4: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) 19:35:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e9}]}) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000002c0), &(0x7f0000000300)=0x8) 19:35:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000400)={0x5, 0x10, 0xfa00, {&(0x7f0000000180)}}, 0x18) 19:35:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000480)={0x0, &(0x7f0000000080)}) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000280)={0x0, @time}) 19:35:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e9}]}) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000002c0), &(0x7f0000000300)=0x8) 19:35:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x200000050178}]}) socket$inet(0x2, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040), 0x0) 19:35:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setns(0xffffffffffffffff, 0x0) 19:35:24 executing program 4: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) 19:35:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000400)={0x5, 0x10, 0xfa00, {&(0x7f0000000180)}}, 0x18) 19:35:24 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x10006}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) 19:35:24 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) utimes(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={{0x77359400}}) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000180), 0x4) [ 939.466194] audit: type=1326 audit(1529696124.464:2040): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26171 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:35:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000280)={0x0, @time}) 19:35:24 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) [ 939.558116] audit: type=1326 audit(1529696124.504:2041): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26181 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:35:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setns(0xffffffffffffffff, 0x0) 19:35:24 executing program 0: openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000002c0), &(0x7f0000000300)=0x8) 19:35:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x200000050178}]}) socket$inet(0x2, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040), 0x0) 19:35:24 executing program 1: mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000400)={0x5, 0x10, 0xfa00, {&(0x7f0000000180)}}, 0x18) 19:35:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000280)={0x0, @time}) 19:35:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setns(0xffffffffffffffff, 0x0) 19:35:24 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) 19:35:24 executing program 0: openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000002c0), &(0x7f0000000300)=0x8) 19:35:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x200000050178}]}) socket$inet(0x2, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040), 0x0) 19:35:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000280)={0x0, @time}) 19:35:25 executing program 1: mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000400)={0x5, 0x10, 0xfa00, {&(0x7f0000000180)}}, 0x18) 19:35:25 executing program 0: openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000002c0), &(0x7f0000000300)=0x8) 19:35:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setns(0xffffffffffffffff, 0x0) 19:35:25 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x10006}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) 19:35:25 executing program 1: mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000400)={0x5, 0x10, 0xfa00, {&(0x7f0000000180)}}, 0x18) 19:35:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x200000050178}]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040), 0x0) 19:35:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x10006}]}) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000280)={0x0, @time}) 19:35:25 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e9}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000002c0), &(0x7f0000000300)=0x8) 19:35:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) 19:35:25 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) utimes(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={{0x77359400}}) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000140)) 19:35:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setns(0xffffffffffffffff, 0x0) [ 940.615186] audit: type=1326 audit(1529696125.612:2042): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26245 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:35:25 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000400)={0x5, 0x10, 0xfa00, {&(0x7f0000000180)}}, 0x18) 19:35:25 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e9}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000002c0), &(0x7f0000000300)=0x8) [ 940.715859] audit: type=1326 audit(1529696125.639:2043): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26244 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:35:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setns(0xffffffffffffffff, 0x0) 19:35:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) 19:35:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x200000050178}]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040), 0x0) 19:35:25 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) utimes(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={{0x77359400}}) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000140)) 19:35:25 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e9}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000002c0), &(0x7f0000000300)=0x8) 19:35:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setns(0xffffffffffffffff, 0x0) 19:35:26 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000400)={0x5, 0x10, 0xfa00, {&(0x7f0000000180)}}, 0x18) [ 941.091923] audit: type=1326 audit(1529696126.090:2044): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26279 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:35:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x10006}]}) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000280)={0x0, @time}) 19:35:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) 19:35:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x200000050178}]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040), 0x0) 19:35:26 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000002c0), &(0x7f0000000300)=0x8) 19:35:26 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000400)={0x5, 0x10, 0xfa00, {&(0x7f0000000180)}}, 0x18) 19:35:26 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) utimes(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={{0x77359400}}) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000140)) 19:35:26 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000080), 0x4) [ 941.675201] audit: type=1326 audit(1529696126.673:2045): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26302 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:35:26 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000002c0), &(0x7f0000000300)=0x8) 19:35:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000400)={0x5, 0x10, 0xfa00, {&(0x7f0000000180)}}, 0x18) 19:35:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) 19:35:26 executing program 2: socket$inet(0x2, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040), 0x0) 19:35:26 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) utimes(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={{0x77359400}}) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000140)) 19:35:26 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000080), 0x4) 19:35:26 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000002c0), &(0x7f0000000300)=0x8) 19:35:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) 19:35:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000400)={0x5, 0x10, 0xfa00, {&(0x7f0000000180)}}, 0x18) [ 942.133340] audit: type=1326 audit(1529696127.131:2046): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26333 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:35:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setns(0xffffffffffffffff, 0x0) 19:35:27 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000080), 0x4) 19:35:27 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000140)) 19:35:27 executing program 2: socket$inet(0x2, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040), 0x0) [ 942.653731] audit: type=1326 audit(1529696127.652:2047): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26345 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:35:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x10006}]}) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000280)={0x0, @time}) 19:35:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e9}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000002c0), &(0x7f0000000300)=0x8) 19:35:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000400)={0x5, 0x10, 0xfa00, {&(0x7f0000000180)}}, 0x18) 19:35:27 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000080), 0x4) 19:35:27 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000140)) [ 942.786419] audit: type=1326 audit(1529696127.780:2048): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26354 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:35:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501cd}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000400)={0x5, 0x10, 0xfa00, {&(0x7f0000000180)}}, 0x18) 19:35:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e9}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000002c0), &(0x7f0000000300)=0x8) 19:35:28 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000140)) 19:35:28 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000080), 0x4) 19:35:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) 19:35:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e9}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000002c0), &(0x7f0000000300)=0x8) 19:35:28 executing program 2: socket$inet(0x2, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040), 0x0) 19:35:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501cd}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000400)={0x5, 0x10, 0xfa00, {&(0x7f0000000180)}}, 0x18) [ 943.200826] audit: type=1326 audit(1529696128.179:2049): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26379 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 943.625748] device bridge_slave_1 left promiscuous mode [ 943.631635] bridge0: port 2(bridge_slave_1) entered disabled state [ 943.652526] device bridge_slave_0 left promiscuous mode [ 943.658579] bridge0: port 1(bridge_slave_0) entered disabled state 19:35:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000002c0), &(0x7f0000000300)=0x8) 19:35:28 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000080), 0x4) 19:35:28 executing program 3: utimes(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={{0x77359400}}) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000140)) 19:35:28 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x200000050178}]}) socket$inet(0x2, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040), 0x0) 19:35:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setns(0xffffffffffffffff, 0x0) 19:35:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) memfd_create(&(0x7f0000000040)='security\x00', 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000180)) 19:35:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501cd}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000400)={0x5, 0x10, 0xfa00, {&(0x7f0000000180)}}, 0x18) [ 943.708569] team0 (unregistering): Port device team_slave_1 removed [ 943.774370] audit: type=1326 audit(1529696128.772:2050): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26397 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 943.794195] audit: type=1326 audit(1529696128.773:2051): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26403 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 943.815753] team0 (unregistering): Port device team_slave_0 removed 19:35:28 executing program 3: utimes(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={{0x77359400}}) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000140)) 19:35:28 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000080), 0x4) [ 943.861390] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 943.928345] bond0 (unregistering): Releasing backup interface bond_slave_0 19:35:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) memfd_create(&(0x7f0000000040)='security\x00', 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000180)) [ 944.064224] bond0 (unregistering): Released all slaves 19:35:29 executing program 3: utimes(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={{0x77359400}}) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000140)) 19:35:29 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) 19:35:29 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000080), 0x4) 19:35:29 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) semget$private(0x0, 0x0, 0x0) semctl$GETZCNT(0x0, 0x0, 0xf, &(0x7f00000001c0)=""/4096) 19:35:29 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) utimes(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={{0x77359400}}) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000140)) 19:35:29 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000080), 0x4) [ 944.670598] IPVS: ftp: loaded support on port[0] = 21 19:35:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000002c0), &(0x7f0000000300)=0x8) 19:35:29 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) utimes(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={{0x77359400}}) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000140)) 19:35:29 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) semget$private(0x0, 0x0, 0x0) semctl$GETZCNT(0x0, 0x0, 0xf, &(0x7f00000001c0)=""/4096) [ 944.708870] IPVS: ftp: loaded support on port[0] = 21 [ 945.722323] device bridge_slave_1 left promiscuous mode [ 945.728162] bridge0: port 2(bridge_slave_1) entered disabled state [ 945.757289] device bridge_slave_0 left promiscuous mode [ 945.763188] bridge0: port 1(bridge_slave_0) entered disabled state [ 945.790198] team0 (unregistering): Port device team_slave_1 removed [ 945.800283] team0 (unregistering): Port device team_slave_0 removed [ 945.810229] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 945.826252] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 945.864473] bond0 (unregistering): Released all slaves [ 946.501257] bridge0: port 1(bridge_slave_0) entered blocking state [ 946.507833] bridge0: port 1(bridge_slave_0) entered disabled state [ 946.516166] device bridge_slave_0 entered promiscuous mode [ 946.610787] bridge0: port 2(bridge_slave_1) entered blocking state [ 946.617299] bridge0: port 2(bridge_slave_1) entered disabled state [ 946.629898] device bridge_slave_1 entered promiscuous mode [ 946.702825] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 946.712896] bridge0: port 1(bridge_slave_0) entered blocking state [ 946.719499] bridge0: port 1(bridge_slave_0) entered disabled state [ 946.734291] device bridge_slave_0 entered promiscuous mode [ 946.764920] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 946.821553] bridge0: port 2(bridge_slave_1) entered blocking state [ 946.828044] bridge0: port 2(bridge_slave_1) entered disabled state [ 946.835319] device bridge_slave_1 entered promiscuous mode [ 946.903667] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 946.959476] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 946.979476] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 947.037817] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 947.095426] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 947.103487] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 947.129563] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 947.188361] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 947.323221] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 947.330854] team0: Port device team_slave_0 added [ 947.385411] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 947.392867] team0: Port device team_slave_1 added [ 947.448991] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 947.465574] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 947.474131] team0: Port device team_slave_0 added [ 947.503975] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 947.530814] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 947.539499] team0: Port device team_slave_1 added [ 947.560449] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 947.568696] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 947.586776] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 947.602778] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 947.633183] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 947.640684] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 947.652532] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 947.670109] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 947.727808] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 947.735517] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 947.752851] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 947.793188] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 947.800737] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 947.809938] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 19:35:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e9}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)=""/69, &(0x7f0000000040)=0x45) 19:35:33 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) semget$private(0x0, 0x0, 0x0) semctl$GETZCNT(0x0, 0x0, 0xf, &(0x7f00000001c0)=""/4096) 19:35:33 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x200000050178}]}) socket$inet(0x2, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040), 0x0) 19:35:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000400)={0x5, 0x10, 0xfa00, {&(0x7f0000000180)}}, 0x18) 19:35:33 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000080), 0x4) 19:35:33 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr}}}}, 0x98) 19:35:33 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000002c0), &(0x7f0000000300)=0x8) 19:35:33 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) utimes(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={{0x77359400}}) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000140)) [ 948.207676] kauditd_printk_skb: 2 callbacks suppressed [ 948.207700] audit: type=1326 audit(1529696133.206:2054): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26619 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 948.238449] device bridge_slave_1 left promiscuous mode [ 948.244305] bridge0: port 2(bridge_slave_1) entered disabled state 19:35:33 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000080), 0x4) 19:35:33 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) utimes(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={{0x77359400}}) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000140)) [ 948.302813] device bridge_slave_0 left promiscuous mode [ 948.308740] bridge0: port 1(bridge_slave_0) entered disabled state 19:35:33 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) semget$private(0x0, 0x0, 0x0) semctl$GETZCNT(0x0, 0x0, 0xf, &(0x7f00000001c0)=""/4096) 19:35:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e9}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)=""/69, &(0x7f0000000040)=0x45) 19:35:33 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr}}}}, 0x98) 19:35:33 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000080), 0x4) [ 948.509247] team0 (unregistering): Port device team_slave_1 removed [ 948.582253] team0 (unregistering): Port device team_slave_0 removed 19:35:33 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) utimes(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={{0x77359400}}) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000140)) [ 948.650582] bond0 (unregistering): Releasing backup interface bond_slave_1 19:35:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e9}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)=""/69, &(0x7f0000000040)=0x45) 19:35:33 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr}}}}, 0x98) [ 948.733941] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 948.960369] bond0 (unregistering): Released all slaves [ 949.101848] IPVS: ftp: loaded support on port[0] = 21 [ 949.168575] IPVS: ftp: loaded support on port[0] = 21 [ 949.833461] device bridge_slave_1 left promiscuous mode [ 949.839337] bridge0: port 2(bridge_slave_1) entered disabled state [ 949.852413] device bridge_slave_0 left promiscuous mode [ 949.858272] bridge0: port 1(bridge_slave_0) entered disabled state [ 949.891520] team0 (unregistering): Port device team_slave_1 removed [ 949.904433] team0 (unregistering): Port device team_slave_0 removed [ 949.916569] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 949.933282] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 949.968109] bond0 (unregistering): Released all slaves [ 951.859844] IPVS: ftp: loaded support on port[0] = 21 [ 952.435299] IPVS: ftp: loaded support on port[0] = 21 [ 953.186824] bridge0: port 1(bridge_slave_0) entered blocking state [ 953.193345] bridge0: port 1(bridge_slave_0) entered disabled state [ 953.213454] device bridge_slave_0 entered promiscuous mode [ 953.289382] bridge0: port 2(bridge_slave_1) entered blocking state [ 953.295915] bridge0: port 2(bridge_slave_1) entered disabled state [ 953.307410] device bridge_slave_1 entered promiscuous mode [ 953.400200] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 953.525302] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 953.734056] bridge0: port 1(bridge_slave_0) entered blocking state [ 953.740603] bridge0: port 1(bridge_slave_0) entered disabled state [ 953.768943] device bridge_slave_0 entered promiscuous mode [ 953.846837] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 953.889213] bridge0: port 2(bridge_slave_1) entered blocking state [ 953.895759] bridge0: port 2(bridge_slave_1) entered disabled state [ 953.925270] device bridge_slave_1 entered promiscuous mode [ 953.944545] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 953.980956] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 954.037285] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 954.062546] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 954.069712] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 954.183988] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 954.191190] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 954.317540] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 954.413489] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 954.478490] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 954.487335] team0: Port device team_slave_0 added [ 954.600986] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 954.621045] team0: Port device team_slave_1 added [ 954.690288] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 954.780392] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 954.789718] team0: Port device team_slave_0 added [ 954.811902] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 954.819000] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 954.836011] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 954.865354] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 954.874981] team0: Port device team_slave_1 added [ 954.943515] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 954.951225] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 954.964291] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 954.995777] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 955.003249] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 955.016152] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 955.111632] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 955.120696] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 955.133897] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 955.148855] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 955.156376] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 955.164984] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 955.251267] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 955.258927] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 955.271352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 955.365964] khugepaged: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 955.376230] khugepaged cpuset=/ mems_allowed=0 [ 955.380842] CPU: 1 PID: 805 Comm: khugepaged Not tainted 4.17.0+ #9 [ 955.387231] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 955.396572] Call Trace: [ 955.399160] dump_stack+0x185/0x1d0 [ 955.402794] warn_alloc+0x430/0x690 [ 955.406420] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 955.411252] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 955.416701] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 955.422076] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 955.427091] ? try_to_compact_pages+0x1643/0x1a40 [ 955.431953] ? try_to_compact_pages+0x19bf/0x1a40 [ 955.436795] ? kmsan_set_origin_inline+0x6b/0x120 [ 955.441631] ? __msan_poison_alloca+0x15c/0x1d0 [ 955.446294] ? __alloc_pages_direct_compact+0x3c1/0x4f0 [ 955.451652] ? compaction_defer_reset+0x62/0x3a0 [ 955.456393] ? __alloc_pages_direct_compact+0x3c1/0x4f0 [ 955.461748] ? compaction_defer_reset+0x109/0x3a0 [ 955.466583] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 955.471934] ? compaction_defer_reset+0x321/0x3a0 [ 955.476768] ? __alloc_pages_direct_compact+0x3c1/0x4f0 [ 955.482121] kmsan_alloc_page+0x82/0xe0 [ 955.486099] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 955.490861] ? switch_fpu_finish+0x6e/0x4f0 [ 955.495175] ? __msan_poison_alloca+0x15c/0x1d0 [ 955.499853] ? _cond_resched+0x3c/0xd0 [ 955.503752] khugepaged_do_scan+0x8c16/0xf190 [ 955.508238] ? khugepaged_do_scan+0x4f61/0xf190 [ 955.512918] khugepaged+0xca/0xbc0 [ 955.516448] ? init_wait_entry+0x1a0/0x1a0 [ 955.520676] kthread+0x4db/0x6c0 [ 955.524034] ? start_stop_khugepaged+0x790/0x790 [ 955.528786] ? kthread_blkcg+0xf0/0xf0 [ 955.532676] ret_from_fork+0x35/0x40 [ 955.536387] Mem-Info: [ 955.538796] active_anon:143181 inactive_anon:78 isolated_anon:14 [ 955.538796] active_file:606 inactive_file:1215 isolated_file:0 [ 955.538796] unevictable:0 dirty:4 writeback:0 unstable:0 [ 955.538796] slab_reclaimable:3305 slab_unreclaimable:9389 [ 955.538796] mapped:67079 shmem:84 pagetables:1140 bounce:0 [ 955.538796] free:35843 free_pcp:73 free_cma:0 [ 955.571700] Node 0 active_anon:572724kB inactive_anon:312kB active_file:2424kB inactive_file:4860kB unevictable:0kB isolated(anon):56kB isolated(file):0kB mapped:268316kB dirty:16kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 247808kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 955.599717] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 955.625841] lowmem_reserve[]: 0 2817 7244 7244 [ 955.630423] Node 0 DMA32 free:69228kB min:26224kB low:32780kB high:39336kB active_anon:226400kB inactive_anon:36kB active_file:1136kB inactive_file:1392kB unevictable:0kB writepending:0kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:1656kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 955.659140] lowmem_reserve[]: 0 0 4426 4426 [ 955.663459] Node 0 Normal free:58240kB min:41208kB low:51508kB high:61808kB active_anon:346208kB inactive_anon:276kB active_file:1300kB inactive_file:3604kB unevictable:0kB writepending:16kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7488kB pagetables:2904kB bounce:0kB free_pcp:292kB local_pcp:0kB free_cma:0kB [ 955.692614] lowmem_reserve[]: 0 0 0 0 [ 955.696409] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 955.709629] Node 0 DMA32: 744*4kB (UMH) 5024*8kB (UMH) 660*16kB (UMEH) 97*32kB (UMEH) 32*64kB (UMEH) 2*128kB (EH) 3*256kB (EH) 7*512kB (UE) 6*1024kB (UE) 0*2048kB 0*4096kB = 69632kB [ 955.725979] Node 0 Normal: 3405*4kB (UME) 2138*8kB (UME) 522*16kB (UME) 146*32kB (UME) 88*64kB (M) 40*128kB (UM) 9*256kB (UM) 1*512kB (M) 1*1024kB (M) 0*2048kB 0*4096kB = 58340kB [ 955.742083] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 955.750643] 1963 total pagecache pages [ 955.754518] 0 pages in swap cache [ 955.757955] Swap cache stats: add 0, delete 0, find 0/0 [ 955.763297] Free swap = 0kB [ 955.766297] Total swap = 0kB [ 955.769305] 1965969 pages RAM [ 955.772392] 0 pages HighMem/MovableOnly [ 955.776346] 106316 pages reserved [ 955.784974] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 955.792569] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 955.801244] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 956.350885] bridge0: port 2(bridge_slave_1) entered blocking state [ 956.357388] bridge0: port 2(bridge_slave_1) entered forwarding state [ 956.364241] bridge0: port 1(bridge_slave_0) entered blocking state [ 956.370664] bridge0: port 1(bridge_slave_0) entered forwarding state [ 956.378214] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 956.390620] bridge0: port 2(bridge_slave_1) entered blocking state [ 956.397383] bridge0: port 2(bridge_slave_1) entered forwarding state [ 956.404360] bridge0: port 1(bridge_slave_0) entered blocking state [ 956.410833] bridge0: port 1(bridge_slave_0) entered forwarding state [ 956.428267] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 956.815546] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 956.831860] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 957.484238] device bridge_slave_1 left promiscuous mode [ 957.490326] bridge0: port 2(bridge_slave_1) entered disabled state [ 957.501780] device bridge_slave_0 left promiscuous mode [ 957.507441] bridge0: port 1(bridge_slave_0) entered disabled state [ 957.542369] team0 (unregistering): Port device team_slave_1 removed [ 957.557135] team0 (unregistering): Port device team_slave_0 removed [ 957.570259] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 957.585733] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 957.610244] bond0 (unregistering): Released all slaves [ 957.693870] syz-executor0: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 957.704404] syz-executor0 cpuset=syz0 mems_allowed=0 [ 957.709577] CPU: 1 PID: 26913 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 957.716418] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 957.725779] Call Trace: [ 957.728373] dump_stack+0x185/0x1d0 [ 957.731991] warn_alloc+0x430/0x690 [ 957.735637] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 957.740470] ? kernel_poison_pages+0x40/0x360 [ 957.744961] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 957.750420] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 957.755428] ? kmsan_set_origin_inline+0x6b/0x120 [ 957.760255] ? __msan_poison_alloca+0x15c/0x1d0 [ 957.764914] kmsan_alloc_page+0x82/0xe0 [ 957.768875] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 957.773623] ? should_fail+0x57/0xab0 [ 957.777408] ? __should_failslab+0x278/0x2a0 [ 957.781814] ? __msan_poison_alloca+0x15c/0x1d0 [ 957.786471] ? kmsan_set_origin+0x9e/0x160 [ 957.790710] alloc_pages_vma+0x1555/0x17f0 [ 957.794938] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 957.800035] handle_mm_fault+0x44ca/0x7ed0 [ 957.804263] ? kmsan_set_origin_inline+0x6b/0x120 [ 957.809101] __do_page_fault+0xec6/0x1a10 [ 957.813239] do_page_fault+0xb7/0x250 [ 957.817028] ? page_fault+0x8/0x30 [ 957.820560] page_fault+0x1e/0x30 [ 957.823993] RIP: 0033:0x4075fa [ 957.827167] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 957.832526] RAX: 0000000020006ac0 RBX: 0000000000000000 RCX: 0000000000000001 [ 957.840581] RDX: 467ee1f675612d02 RSI: 0000000000000000 RDI: 00000000018d6848 [ 957.847841] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 957.855094] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000ea01d [ 957.862349] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 957.869610] Mem-Info: [ 957.872020] active_anon:143184 inactive_anon:76 isolated_anon:0 [ 957.872020] active_file:1333 inactive_file:2207 isolated_file:0 [ 957.872020] unevictable:0 dirty:18 writeback:0 unstable:0 [ 957.872020] slab_reclaimable:3305 slab_unreclaimable:9358 [ 957.872020] mapped:51834 shmem:84 pagetables:1056 bounce:0 [ 957.872020] free:78093 free_pcp:245 free_cma:0 [ 957.905105] Node 0 active_anon:572736kB inactive_anon:304kB active_file:5332kB inactive_file:8828kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:207336kB dirty:72kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 247808kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 957.932950] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 957.959067] lowmem_reserve[]: 0 2817 7244 7244 [ 957.963641] Node 0 DMA32 free:247160kB min:26224kB low:32780kB high:39336kB active_anon:226288kB inactive_anon:24kB active_file:1388kB inactive_file:1536kB unevictable:0kB writepending:0kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1984kB pagetables:1476kB bounce:0kB free_pcp:388kB local_pcp:280kB free_cma:0kB [ 957.992887] lowmem_reserve[]: 0 0 4426 4426 [ 957.997203] Node 0 Normal free:49308kB min:41208kB low:51508kB high:61808kB active_anon:346216kB inactive_anon:280kB active_file:3944kB inactive_file:7164kB unevictable:0kB writepending:72kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7296kB pagetables:2748kB bounce:0kB free_pcp:592kB local_pcp:380kB free_cma:0kB [ 958.026534] lowmem_reserve[]: 0 0 0 0 [ 958.030335] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 958.043541] Node 0 DMA32: 541*4kB (UMH) 6851*8kB (UMH) 1925*16kB (UMEH) 1047*32kB (UMEH) 865*64kB (UMEH) 188*128kB (UEH) 125*256kB (UEH) 16*512kB (UE) 6*1024kB (UE) 0*2048kB 0*4096kB = 247036kB [ 958.060921] Node 0 Normal: 2103*4kB (UME) 1536*8kB (UME) 526*16kB (UME) 151*32kB (UME) 92*64kB (UM) 44*128kB (UM) 9*256kB (UM) 1*512kB (M) 1*1024kB (M) 0*2048kB 0*4096kB = 49308kB [ 958.077102] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 958.085659] 3665 total pagecache pages [ 958.089534] 0 pages in swap cache [ 958.092971] Swap cache stats: add 0, delete 0, find 0/0 [ 958.098314] Free swap = 0kB [ 958.101315] Total swap = 0kB [ 958.104329] 1965969 pages RAM [ 958.107413] 0 pages HighMem/MovableOnly [ 958.111369] 106316 pages reserved [ 958.123769] syz-executor4: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 958.134301] syz-executor4 cpuset=syz4 mems_allowed=0 [ 958.139453] CPU: 1 PID: 26916 Comm: syz-executor4 Not tainted 4.17.0+ #9 [ 958.146294] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 958.155653] Call Trace: [ 958.158257] dump_stack+0x185/0x1d0 [ 958.161895] warn_alloc+0x430/0x690 [ 958.165553] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 958.170400] ? kernel_poison_pages+0x40/0x360 [ 958.174905] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 958.180368] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 958.185358] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 958.190399] ? kmsan_set_origin_inline+0x6b/0x120 [ 958.195252] ? __msan_poison_alloca+0x15c/0x1d0 [ 958.199941] kmsan_alloc_page+0x82/0xe0 [ 958.203928] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 958.208707] ? should_fail+0x57/0xab0 [ 958.212524] ? __should_failslab+0x278/0x2a0 [ 958.216951] ? __msan_poison_alloca+0x15c/0x1d0 [ 958.221646] ? kmsan_set_origin+0x9e/0x160 [ 958.225918] alloc_pages_vma+0x1555/0x17f0 [ 958.230174] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 958.235294] handle_mm_fault+0x44ca/0x7ed0 [ 958.239549] ? kmsan_set_origin_inline+0x6b/0x120 [ 958.244421] __do_page_fault+0xec6/0x1a10 [ 958.248590] do_page_fault+0xb7/0x250 [ 958.252400] ? page_fault+0x8/0x30 [ 958.255942] page_fault+0x1e/0x30 [ 958.259395] RIP: 0033:0x4075fa [ 958.262580] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 958.267948] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 0000000000000001 [ 958.275226] RDX: 8e5ad6ffde015625 RSI: 0000000000000000 RDI: 00000000021c6848 [ 958.282500] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 19:35:42 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x200000050178}]}) socket$inet(0x2, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040), 0x0) 19:35:42 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000080), 0x4) 19:35:42 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180), 0x0) 19:35:42 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) semctl$GETZCNT(0x0, 0x0, 0xf, &(0x7f00000001c0)=""/4096) 19:35:42 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) utimes(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={{0x77359400}}) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000140)) 19:35:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e9}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)=""/69, &(0x7f0000000040)=0x45) 19:35:42 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr}}}}, 0x98) 19:35:42 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000400)={0x5, 0x10, 0xfa00, {&(0x7f0000000180)}}, 0x18) [ 958.289829] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000ea1cb [ 958.297108] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 958.319910] syz-executor5: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 958.330445] syz-executor5 cpuset=syz5 mems_allowed=0 [ 958.335573] CPU: 1 PID: 26922 Comm: syz-executor5 Not tainted 4.17.0+ #9 19:35:43 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) utimes(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={{0x77359400}}) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000140)) [ 958.342414] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 958.351773] Call Trace: [ 958.354377] dump_stack+0x185/0x1d0 [ 958.358018] warn_alloc+0x430/0x690 [ 958.361674] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 958.366623] ? kernel_poison_pages+0x40/0x360 [ 958.371139] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 958.376611] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 958.381592] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 958.386725] ? kmsan_set_origin_inline+0x6b/0x120 [ 958.391586] ? __msan_poison_alloca+0x15c/0x1d0 [ 958.396282] kmsan_alloc_page+0x82/0xe0 [ 958.400360] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 958.405138] ? should_fail+0x57/0xab0 [ 958.408955] ? __should_failslab+0x278/0x2a0 [ 958.413379] ? __msan_poison_alloca+0x15c/0x1d0 [ 958.418069] ? kmsan_set_origin+0x9e/0x160 [ 958.422328] alloc_pages_vma+0x1555/0x17f0 [ 958.426590] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 958.431718] handle_mm_fault+0x44ca/0x7ed0 [ 958.435972] ? kmsan_set_origin_inline+0x6b/0x120 [ 958.440871] __do_page_fault+0xec6/0x1a10 [ 958.445043] do_page_fault+0xb7/0x250 [ 958.448861] ? page_fault+0x8/0x30 [ 958.452416] page_fault+0x1e/0x30 [ 958.455876] RIP: 0033:0x4075fa [ 958.459070] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 958.464440] RAX: 00000000200000c0 RBX: 0000000000000000 RCX: 0000000000000001 [ 958.471717] RDX: 7de9c603845cffcb RSI: 0000000000000000 RDI: 00000000013c3848 [ 958.478998] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 958.486276] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000ea28f [ 958.493558] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 958.504971] syz-executor6: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 958.515538] syz-executor6 cpuset=syz6 mems_allowed=0 [ 958.520689] CPU: 1 PID: 26921 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 958.527539] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 958.536905] Call Trace: [ 958.539511] dump_stack+0x185/0x1d0 [ 958.543150] warn_alloc+0x430/0x690 [ 958.546790] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 958.551663] ? kernel_poison_pages+0x40/0x360 [ 958.556178] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 958.561641] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 958.566599] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 958.571645] ? kmsan_set_origin_inline+0x6b/0x120 [ 958.576522] ? __msan_poison_alloca+0x15c/0x1d0 [ 958.581233] kmsan_alloc_page+0x82/0xe0 [ 958.585220] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 958.589996] ? should_fail+0x57/0xab0 [ 958.593814] ? __should_failslab+0x278/0x2a0 [ 958.598239] ? __msan_poison_alloca+0x15c/0x1d0 [ 958.602918] ? kmsan_set_origin+0x9e/0x160 [ 958.607156] alloc_pages_vma+0x1555/0x17f0 [ 958.611387] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 958.616521] handle_mm_fault+0x44ca/0x7ed0 [ 958.620751] ? kmsan_set_origin_inline+0x6b/0x120 [ 958.625594] __do_page_fault+0xec6/0x1a10 [ 958.629735] do_page_fault+0xb7/0x250 [ 958.633531] ? page_fault+0x8/0x30 [ 958.637062] page_fault+0x1e/0x30 [ 958.640497] RIP: 0033:0x4075fa [ 958.643678] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 958.649025] RAX: 00000000200000c0 RBX: 0000000000000000 RCX: 0000000000000001 [ 958.656287] RDX: 3506fcbafe7818e7 RSI: 0000000000000000 RDI: 0000000001cb1848 [ 958.663544] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 958.670819] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000ea348 [ 958.678074] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 19:35:43 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) utimes(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={{0x77359400}}) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000140)) [ 958.802172] IPVS: ftp: loaded support on port[0] = 21 19:35:43 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) utimes(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={{0x77359400}}) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000140)) 19:35:44 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) utimes(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={{0x77359400}}) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000140)) 19:35:44 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000080), 0x4) [ 959.091338] IPVS: ftp: loaded support on port[0] = 21 19:35:44 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr}}}}, 0x98) 19:35:44 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) fchdir(0xffffffffffffffff) 19:35:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e9}]}) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)=""/69, &(0x7f0000000040)=0x45) [ 960.347733] device bridge_slave_1 left promiscuous mode [ 960.353531] bridge0: port 2(bridge_slave_1) entered disabled state [ 960.372187] device bridge_slave_0 left promiscuous mode [ 960.377980] bridge0: port 1(bridge_slave_0) entered disabled state [ 960.390753] device bridge_slave_1 left promiscuous mode [ 960.396511] bridge0: port 2(bridge_slave_1) entered disabled state [ 960.409038] device bridge_slave_0 left promiscuous mode [ 960.414839] bridge0: port 1(bridge_slave_0) entered disabled state [ 960.427806] device bridge_slave_1 left promiscuous mode [ 960.433598] bridge0: port 2(bridge_slave_1) entered disabled state [ 960.446169] device bridge_slave_0 left promiscuous mode [ 960.451952] bridge0: port 1(bridge_slave_0) entered disabled state [ 960.464738] device bridge_slave_1 left promiscuous mode [ 960.470522] bridge0: port 2(bridge_slave_1) entered disabled state [ 960.483189] device bridge_slave_0 left promiscuous mode [ 960.489045] bridge0: port 1(bridge_slave_0) entered disabled state [ 960.501813] device bridge_slave_1 left promiscuous mode [ 960.507641] bridge0: port 2(bridge_slave_1) entered disabled state [ 960.520252] device bridge_slave_0 left promiscuous mode [ 960.526107] bridge0: port 1(bridge_slave_0) entered disabled state [ 960.645371] team0 (unregistering): Port device team_slave_1 removed [ 960.657761] team0 (unregistering): Port device team_slave_0 removed [ 960.669929] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 960.686808] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 960.719281] bond0 (unregistering): Released all slaves [ 960.739187] team0 (unregistering): Port device team_slave_1 removed [ 960.751941] team0 (unregistering): Port device team_slave_0 removed [ 960.763995] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 960.780613] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 960.813254] bond0 (unregistering): Released all slaves [ 960.834174] team0 (unregistering): Port device team_slave_1 removed [ 960.852168] team0 (unregistering): Port device team_slave_0 removed [ 960.864839] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 960.882995] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 960.908626] bond0 (unregistering): Released all slaves [ 960.931191] team0 (unregistering): Port device team_slave_1 removed [ 960.940851] team0 (unregistering): Port device team_slave_0 removed [ 960.950644] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 960.968953] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 960.994330] bond0 (unregistering): Released all slaves [ 961.017006] team0 (unregistering): Port device team_slave_1 removed [ 961.026595] team0 (unregistering): Port device team_slave_0 removed [ 961.036354] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 961.058814] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 961.082367] bond0 (unregistering): Released all slaves [ 961.371749] bridge0: port 1(bridge_slave_0) entered blocking state [ 961.378224] bridge0: port 1(bridge_slave_0) entered disabled state [ 961.385689] device bridge_slave_0 entered promiscuous mode [ 961.422724] bridge0: port 2(bridge_slave_1) entered blocking state [ 961.429163] bridge0: port 2(bridge_slave_1) entered disabled state [ 961.436552] device bridge_slave_1 entered promiscuous mode [ 961.492965] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 961.549472] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 961.718154] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 961.778408] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 962.082101] IPVS: ftp: loaded support on port[0] = 21 [ 962.125900] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 962.143797] team0: Port device team_slave_0 added [ 962.255223] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 962.271153] team0: Port device team_slave_1 added [ 962.368762] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 962.376142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 962.388030] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 962.502714] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 962.509817] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 962.522447] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 962.603521] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 962.611184] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 962.628436] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 962.674653] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 962.682473] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 962.691144] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 963.188326] bridge0: port 1(bridge_slave_0) entered blocking state [ 963.194785] bridge0: port 1(bridge_slave_0) entered disabled state [ 963.202253] device bridge_slave_0 entered promiscuous mode [ 963.261789] bridge0: port 2(bridge_slave_1) entered blocking state [ 963.268300] bridge0: port 2(bridge_slave_1) entered disabled state [ 963.275850] device bridge_slave_1 entered promiscuous mode [ 963.310739] bridge0: port 2(bridge_slave_1) entered blocking state [ 963.317259] bridge0: port 2(bridge_slave_1) entered forwarding state [ 963.324162] bridge0: port 1(bridge_slave_0) entered blocking state [ 963.330633] bridge0: port 1(bridge_slave_0) entered forwarding state [ 963.338356] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 963.349588] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 963.406688] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 963.573577] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 963.633391] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 963.911602] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 963.919662] team0: Port device team_slave_0 added [ 963.978436] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 963.986919] team0: Port device team_slave_1 added [ 964.044944] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 964.106203] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 964.167557] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 964.174983] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 964.185580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 964.231744] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 964.239232] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 964.247892] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 964.296338] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 964.861379] bridge0: port 2(bridge_slave_1) entered blocking state [ 964.867890] bridge0: port 2(bridge_slave_1) entered forwarding state [ 964.874767] bridge0: port 1(bridge_slave_0) entered blocking state [ 964.881664] bridge0: port 1(bridge_slave_0) entered forwarding state [ 964.890179] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 965.304168] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 965.603141] 8021q: adding VLAN 0 to HW filter on device bond0 [ 965.809566] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 966.012037] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 966.018678] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 966.026921] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 966.215731] 8021q: adding VLAN 0 to HW filter on device team0 [ 967.178853] 8021q: adding VLAN 0 to HW filter on device bond0 [ 967.385856] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 967.452643] audit: type=1326 audit(1529696152.451:2055): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27398 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 967.573211] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 967.579605] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 967.587843] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 967.728532] 8021q: adding VLAN 0 to HW filter on device team0 19:35:53 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr}}}}, 0x98) 19:35:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040), 0x0) 19:35:53 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) semctl$GETZCNT(0x0, 0x0, 0xf, &(0x7f00000001c0)=""/4096) 19:35:53 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e9}]}) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)=""/69, &(0x7f0000000040)=0x45) 19:35:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f00000001c0)) 19:35:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000400)={0x5, 0x10, 0xfa00, {&(0x7f0000000180)}}, 0x18) 19:35:53 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) utimes(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={{0x77359400}}) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000140)) 19:35:53 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000080), 0x4) [ 968.895566] audit: type=1326 audit(1529696153.894:2056): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27472 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:35:54 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e9}]}) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)=""/69, &(0x7f0000000040)=0x45) 19:35:54 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) semctl$GETZCNT(0x0, 0x0, 0xf, &(0x7f00000001c0)=""/4096) 19:35:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040), 0x0) 19:35:54 executing program 4: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)=""/69, &(0x7f0000000040)=0x45) 19:35:54 executing program 7: semget$private(0x0, 0x0, 0x0) semctl$GETZCNT(0x0, 0x0, 0xf, &(0x7f00000001c0)=""/4096) 19:35:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040), 0x0) 19:35:54 executing program 4: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)=""/69, &(0x7f0000000040)=0x45) 19:35:54 executing program 7: semget$private(0x0, 0x0, 0x0) semctl$GETZCNT(0x0, 0x0, 0xf, &(0x7f00000001c0)=""/4096) [ 969.641877] syz-executor4: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 969.643818] syz-executor7: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 969.653352] syz-executor4 cpuset=syz4 mems_allowed=0 [ 969.653404] CPU: 1 PID: 27507 Comm: syz-executor4 Not tainted 4.17.0+ #9 [ 969.653431] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 969.664814] syz-executor7 cpuset= [ 969.669820] Call Trace: [ 969.669869] dump_stack+0x185/0x1d0 [ 969.669902] warn_alloc+0x430/0x690 [ 969.669970] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 969.676820] syz7 [ 969.686167] ? __msan_poison_alloca+0x15c/0x1d0 [ 969.689642] mems_allowed=0 [ 969.692197] copy_process+0x778/0x9be0 [ 969.692246] ? __msan_poison_alloca+0x15c/0x1d0 [ 969.722405] ? handle_mm_fault+0x74eb/0x7ed0 [ 969.726843] ? handle_mm_fault+0x74eb/0x7ed0 [ 969.731303] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 969.736712] ? lru_cache_add_active_or_unevictable+0x3da/0x5f0 [ 969.742726] ? handle_mm_fault+0x1eb0/0x7ed0 [ 969.747162] ? __msan_poison_alloca+0x140/0x1d0 [ 969.751878] _do_fork+0x353/0xf60 [ 969.755363] __x64_sys_clone+0x15e/0x1b0 [ 969.759445] ? __ia32_sys_vfork+0x70/0x70 [ 969.763612] do_syscall_64+0x15b/0x230 [ 969.767530] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 969.772731] RIP: 0033:0x458429 [ 969.775928] RSP: 002b:0000000000a3e768 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 969.783668] RAX: ffffffffffffffda RBX: 00007fbbffeeb700 RCX: 0000000000458429 [ 969.790948] RDX: 00007fbbffeeb9d0 RSI: 00007fbbffeeadb0 RDI: 00000000003d0f00 [ 969.798227] RBP: 0000000000a3e8a0 R08: 00007fbbffeeb700 R09: 00007fbbffeeb700 [ 969.805537] R10: 00007fbbffeeb9d0 R11: 0000000000000202 R12: 0000000000000000 [ 969.812830] R13: 0000000000a3e81f R14: 00007fbbffeeb9c0 R15: 0000000000000000 [ 969.820143] CPU: 0 PID: 4542 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 969.820596] warn_alloc_show_mem: 3 callbacks suppressed [ 969.820603] Mem-Info: [ 969.826922] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 969.826933] Call Trace: [ 969.826977] dump_stack+0x185/0x1d0 [ 969.827019] warn_alloc+0x430/0x690 [ 969.832467] active_anon:144356 inactive_anon:78 isolated_anon:0 [ 969.832467] active_file:2196 inactive_file:5290 isolated_file:57 [ 969.832467] unevictable:0 dirty:64 writeback:0 unstable:0 [ 969.832467] slab_reclaimable:3298 slab_unreclaimable:8269 [ 969.832467] mapped:69518 shmem:84 pagetables:1095 bounce:0 [ 969.832467] free:21786 free_pcp:99 free_cma:0 [ 969.834825] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 969.834893] ? __msan_poison_alloca+0x15c/0x1d0 [ 969.844338] Node 0 active_anon:577424kB inactive_anon:312kB active_file:8784kB inactive_file:21160kB unevictable:0kB isolated(anon):0kB isolated(file):228kB mapped:278072kB dirty:256kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 249856kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 969.846871] copy_process+0x778/0x9be0 [ 969.850485] Node 0 [ 969.854097] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 969.854202] ? ptep_set_access_flags+0x10e/0x1d0 [ 969.887347] DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 969.892118] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 969.892174] ? handle_mm_fault+0x1eb0/0x7ed0 [ 969.896831] lowmem_reserve[]: [ 969.925039] ? __msan_poison_alloca+0x141/0x1d0 [ 969.925094] _do_fork+0x353/0xf60 [ 969.925137] __x64_sys_clone+0x15e/0x1b0 [ 969.929059] 0 [ 969.931253] ? __ia32_sys_vfork+0x70/0x70 [ 969.931288] do_syscall_64+0x15b/0x230 [ 969.936742] 2817 [ 969.941499] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 969.941533] RIP: 0033:0x45414a [ 969.967096] 7244 [ 969.972488] RSP: 002b:0000000000a3ea70 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 969.972518] RAX: ffffffffffffffda RBX: 0000000000a3ea70 RCX: 000000000045414a [ 969.972543] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 969.976974] 7244 [ 969.980048] RBP: 0000000000a3eab0 R08: 0000000000000001 R09: 0000000001e56940 [ 969.980065] R10: 0000000001e56c10 R11: 0000000000000246 R12: 0000000000000001 [ 969.980078] R13: 0000000000000000 R14: 0000000000000000 R15: 00000000007024c0 [ 970.057383] kworker/u4:6: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 970.062112] Node 0 DMA32 free:48932kB min:26224kB low:32780kB high:39336kB active_anon:229316kB inactive_anon:24kB active_file:4584kB inactive_file:16612kB unevictable:0kB writepending:96kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1856kB pagetables:1608kB bounce:0kB free_pcp:364kB local_pcp:124kB free_cma:0kB [ 970.062205] lowmem_reserve[]: [ 970.073970] kworker/u4:6 cpuset=/ mems_allowed=0 [ 970.103304] 0 0 [ 970.106486] CPU: 0 PID: 580 Comm: kworker/u4:6 Not tainted 4.17.0+ #9 [ 970.111248] 4426 [ 970.113189] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 970.113233] Workqueue: events_unbound call_usermodehelper_exec_work [ 970.119851] 4426 [ 970.121870] Call Trace: [ 970.121914] dump_stack+0x185/0x1d0 [ 970.121954] warn_alloc+0x430/0x690 [ 970.137736] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 970.137798] ? __msan_poison_alloca+0x15c/0x1d0 [ 970.139843] Node 0 [ 970.142451] copy_process+0x778/0x9be0 [ 970.146132] Normal free:23008kB min:41208kB low:51508kB high:61808kB active_anon:345804kB inactive_anon:284kB active_file:3772kB inactive_file:4460kB unevictable:0kB writepending:184kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7360kB pagetables:2768kB bounce:0kB free_pcp:496kB local_pcp:124kB free_cma:0kB [ 970.149691] ? update_load_avg+0x1bd6/0x2cc0 [ 970.149739] ? proc_cap_handler+0x6a0/0x6a0 [ 970.154583] lowmem_reserve[]: [ 970.159236] ? __msan_poison_alloca+0x140/0x1d0 [ 970.159294] _do_fork+0x353/0xf60 [ 970.161511] 0 [ 970.165391] ? proc_cap_handler+0x6a0/0x6a0 [ 970.165434] kernel_thread+0xc6/0xe0 [ 970.194287] 0 [ 970.198659] ? proc_cap_handler+0x6a0/0x6a0 [ 970.198700] call_usermodehelper_exec_work+0x146/0x520 [ 970.203017] 0 [ 970.206122] ? __list_del_entry_valid+0x123/0x440 [ 970.206157] ? process_one_work+0x1290/0x1fa0 [ 970.210831] 0 [ 970.214268] ? call_usermodehelper_setup+0x4d0/0x4d0 [ 970.214314] process_one_work+0x12e4/0x1fa0 [ 970.220420] worker_thread+0x113c/0x24f0 [ 970.220468] kthread+0x4db/0x6c0 [ 970.224174] Node 0 [ 970.225953] ? process_one_work+0x1fa0/0x1fa0 [ 970.225998] ? kthread_blkcg+0xf0/0xf0 [ 970.230324] DMA: [ 970.235585] ret_from_fork+0x35/0x40 [ 970.282575] 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 970.294984] Node 0 DMA32: 236*4kB (UME) 1707*8kB (UME) 503*16kB (UM) 66*32kB (UME) 15*64kB (UME) 7*128kB (UME) 6*256kB (ME) 7*512kB (UME) 5*1024kB (UME) 1*2048kB (U) 2*4096kB (M) = 47096kB [ 970.312262] Node 0 Normal: 1618*4kB (UME) 928*8kB (ME) 247*16kB (UME) 25*32kB (UME) 8*64kB (UM) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 19160kB [ 970.326776] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 970.335443] 7404 total pagecache pages [ 970.336151] syz-executor6: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 970.339414] 0 pages in swap cache [ 970.339429] Swap cache stats: add 0, delete 0, find 0/0 [ 970.339450] Free swap = 0kB [ 970.350773] syz-executor6 cpuset= [ 970.354253] Total swap = 0kB [ 970.354272] 1965969 pages RAM [ 970.359674] / [ 970.362715] 0 pages HighMem/MovableOnly [ 970.366362] mems_allowed=0 [ 970.369220] 106316 pages reserved [ 970.384882] CPU: 0 PID: 27482 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 970.391764] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 970.401164] Call Trace: [ 970.403816] dump_stack+0x185/0x1d0 [ 970.407489] warn_alloc+0x430/0x690 [ 970.411178] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 970.416111] ? __msan_poison_alloca+0x15c/0x1d0 [ 970.420881] copy_process+0x778/0x9be0 [ 970.424840] ? __msan_poison_alloca+0x15c/0x1d0 [ 970.429574] ? handle_mm_fault+0x74eb/0x7ed0 [ 970.434068] ? handle_mm_fault+0x74eb/0x7ed0 [ 970.438554] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 970.444249] ? lru_cache_add_active_or_unevictable+0x3da/0x5f0 [ 970.450302] ? handle_mm_fault+0x1eb0/0x7ed0 [ 970.454770] ? __msan_poison_alloca+0x141/0x1d0 [ 970.459518] _do_fork+0x353/0xf60 [ 970.463048] __x64_sys_clone+0x15e/0x1b0 [ 970.467165] ? __ia32_sys_vfork+0x70/0x70 [ 970.471357] do_syscall_64+0x15b/0x230 [ 970.475304] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 970.480533] RIP: 0033:0x458429 [ 970.483747] RSP: 002b:00007ffc76ac01e8 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 970.491506] RAX: ffffffffffffffda RBX: 00007ffc76ac02a0 RCX: 0000000000458429 [ 970.498815] RDX: 434f503a30656c69 RSI: 0000000000a3ffb0 RDI: 0000000030000000 [ 970.506125] RBP: 0000000000000000 R08: 000000000000001a R09: 000000000000001a [ 970.513433] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000411910 [ 970.520748] R13: 00000000004119a0 R14: 0000000000000000 R15: 0000000000000000 [ 970.531384] udevd: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 970.542103] udevd cpuset=/ mems_allowed=0 [ 970.546429] CPU: 0 PID: 6669 Comm: udevd Not tainted 4.17.0+ #9 [ 970.552533] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 970.561921] Call Trace: [ 970.564574] dump_stack+0x185/0x1d0 [ 970.568259] warn_alloc+0x430/0x690 [ 970.571971] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 970.576909] ? __msan_poison_alloca+0x15c/0x1d0 [ 970.581700] copy_process+0x778/0x9be0 [ 970.585640] ? expand_files+0x5b/0xe00 [ 970.589605] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 970.595037] ? expand_files+0xa6/0xe00 [ 970.599011] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 970.604515] ? find_next_zero_bit+0x12b/0x2f0 [ 970.609083] ? __msan_poison_alloca+0x141/0x1d0 [ 970.613827] _do_fork+0x353/0xf60 [ 970.617361] __x64_sys_clone+0x15e/0x1b0 [ 970.621486] ? __ia32_sys_vfork+0x70/0x70 [ 970.625684] do_syscall_64+0x15b/0x230 [ 970.629636] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 970.634870] RIP: 0033:0x7efec2e07f46 [ 970.638609] RSP: 002b:00007ffe736e9430 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 970.646366] RAX: ffffffffffffffda RBX: 00007ffe736e9430 RCX: 00007efec2e07f46 [ 970.653678] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 970.660998] RBP: 00007ffe736e9490 R08: 0000000000001a0d R09: 0000000000001a0d [ 970.668310] R10: 00007efec3724a70 R11: 0000000000000246 R12: 0000000000000000 [ 970.675629] R13: 00007ffe736e9450 R14: 0000000000000005 R15: 0000000000000005 [ 970.947972] device bridge_slave_1 left promiscuous mode [ 970.953953] bridge0: port 2(bridge_slave_1) entered disabled state [ 970.986008] device bridge_slave_0 left promiscuous mode [ 970.992181] bridge0: port 1(bridge_slave_0) entered disabled state [ 971.025863] team0 (unregistering): Port device team_slave_1 removed [ 971.035929] team0 (unregistering): Port device team_slave_0 removed [ 971.046743] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 971.068624] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 971.103873] bond0 (unregistering): Released all slaves [ 973.016220] IPVS: ftp: loaded support on port[0] = 21 [ 973.621852] IPVS: ftp: loaded support on port[0] = 21 [ 973.746739] IPVS: ftp: loaded support on port[0] = 21 [ 973.773371] IPVS: ftp: loaded support on port[0] = 21 [ 974.365801] bridge0: port 1(bridge_slave_0) entered blocking state [ 974.372324] bridge0: port 1(bridge_slave_0) entered disabled state [ 974.381717] device bridge_slave_0 entered promiscuous mode [ 974.491666] bridge0: port 2(bridge_slave_1) entered blocking state [ 974.498171] bridge0: port 2(bridge_slave_1) entered disabled state [ 974.507461] device bridge_slave_1 entered promiscuous mode [ 974.624650] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 974.766259] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 975.110406] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 975.217032] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 975.333722] bridge0: port 1(bridge_slave_0) entered blocking state [ 975.340213] bridge0: port 1(bridge_slave_0) entered disabled state [ 975.349221] device bridge_slave_0 entered promiscuous mode [ 975.493733] bridge0: port 2(bridge_slave_1) entered blocking state [ 975.500223] bridge0: port 2(bridge_slave_1) entered disabled state [ 975.509779] device bridge_slave_1 entered promiscuous mode [ 975.533161] bridge0: port 1(bridge_slave_0) entered blocking state [ 975.539665] bridge0: port 1(bridge_slave_0) entered disabled state [ 975.574863] device bridge_slave_0 entered promiscuous mode [ 975.588596] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 975.596842] bridge0: port 1(bridge_slave_0) entered blocking state [ 975.603377] bridge0: port 1(bridge_slave_0) entered disabled state [ 975.612690] device bridge_slave_0 entered promiscuous mode [ 975.691132] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 975.704315] bridge0: port 2(bridge_slave_1) entered blocking state [ 975.710823] bridge0: port 2(bridge_slave_1) entered disabled state [ 975.718481] device bridge_slave_1 entered promiscuous mode [ 975.729975] bridge0: port 2(bridge_slave_1) entered blocking state [ 975.736567] bridge0: port 2(bridge_slave_1) entered disabled state [ 975.763972] device bridge_slave_1 entered promiscuous mode [ 975.804945] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 975.881464] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 975.898588] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 975.906345] team0: Port device team_slave_0 added [ 975.912257] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 976.011527] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 976.032728] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 976.041033] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 976.051394] team0: Port device team_slave_1 added [ 976.162238] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 976.180527] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 976.192249] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 976.216878] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 976.262445] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 976.276480] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 976.287304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 976.304716] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 976.311751] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 976.323961] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 976.376754] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 976.410162] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 976.435464] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 976.443211] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 976.458216] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 976.484647] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 976.601616] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 976.609228] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 976.623015] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 976.657355] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 976.669449] team0: Port device team_slave_0 added [ 976.780416] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 976.787991] team0: Port device team_slave_1 added [ 976.942357] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 976.949518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 976.968282] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 977.050389] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 977.058128] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 977.068940] team0: Port device team_slave_0 added [ 977.074600] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 977.086744] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 977.114950] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 977.138600] team0: Port device team_slave_0 added [ 977.160610] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 977.168588] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 977.185790] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 977.213418] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 977.227947] team0: Port device team_slave_1 added [ 977.254353] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 977.262295] team0: Port device team_slave_1 added [ 977.268689] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 977.277437] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 977.296444] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 977.351400] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 977.359016] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 977.372740] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 977.386316] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 977.398774] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 977.407391] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 977.499469] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 977.527592] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 977.572997] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 977.580570] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 977.594719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 977.643923] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 977.651518] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 977.664864] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 977.763934] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 977.771706] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 977.783669] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 977.797335] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 977.804909] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 977.817369] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 978.094101] bridge0: port 2(bridge_slave_1) entered blocking state [ 978.100598] bridge0: port 2(bridge_slave_1) entered forwarding state [ 978.107436] bridge0: port 1(bridge_slave_0) entered blocking state [ 978.113897] bridge0: port 1(bridge_slave_0) entered forwarding state [ 978.136293] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 978.540934] bridge0: port 2(bridge_slave_1) entered blocking state [ 978.547433] bridge0: port 2(bridge_slave_1) entered forwarding state [ 978.554341] bridge0: port 1(bridge_slave_0) entered blocking state [ 978.560803] bridge0: port 1(bridge_slave_0) entered forwarding state [ 978.578343] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 978.911891] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 978.923019] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 979.295516] bridge0: port 2(bridge_slave_1) entered blocking state [ 979.302029] bridge0: port 2(bridge_slave_1) entered forwarding state [ 979.308930] bridge0: port 1(bridge_slave_0) entered blocking state [ 979.315442] bridge0: port 1(bridge_slave_0) entered forwarding state [ 979.336290] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 979.354863] bridge0: port 2(bridge_slave_1) entered blocking state [ 979.361351] bridge0: port 2(bridge_slave_1) entered forwarding state [ 979.368226] bridge0: port 1(bridge_slave_0) entered blocking state [ 979.374662] bridge0: port 1(bridge_slave_0) entered forwarding state [ 979.386173] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 979.935636] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 979.956124] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 981.253558] device bridge_slave_1 left promiscuous mode [ 981.259358] bridge0: port 2(bridge_slave_1) entered disabled state [ 981.276975] device bridge_slave_0 left promiscuous mode [ 981.282682] bridge0: port 1(bridge_slave_0) entered disabled state [ 981.313703] team0 (unregistering): Port device team_slave_1 removed [ 981.324195] team0 (unregistering): Port device team_slave_0 removed [ 981.335968] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 981.355601] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 981.382745] bond0 (unregistering): Released all slaves 19:36:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x200000050178}]}) socket$inet(0x2, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040), 0x0) 19:36:06 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr}}}}, 0x98) 19:36:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50208}]}) getpid() sched_getattr(0x0, &(0x7f0000000000), 0x30, 0x0) 19:36:06 executing program 4: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)=""/69, &(0x7f0000000040)=0x45) [ 981.695456] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 981.906743] IPVS: ftp: loaded support on port[0] = 21 [ 982.103314] 8021q: adding VLAN 0 to HW filter on device team0 19:36:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f00000001c0)) 19:36:07 executing program 7: semget$private(0x0, 0x0, 0x0) semctl$GETZCNT(0x0, 0x0, 0xf, &(0x7f00000001c0)=""/4096) [ 982.880684] device bridge_slave_1 left promiscuous mode [ 982.886475] bridge0: port 2(bridge_slave_1) entered disabled state [ 982.924180] device bridge_slave_0 left promiscuous mode [ 982.929913] bridge0: port 1(bridge_slave_0) entered disabled state [ 982.971925] team0 (unregistering): Port device team_slave_1 removed [ 982.983988] team0 (unregistering): Port device team_slave_0 removed [ 982.995894] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 983.054139] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 983.106154] bond0 (unregistering): Released all slaves [ 984.158638] bridge0: port 1(bridge_slave_0) entered blocking state [ 984.165170] bridge0: port 1(bridge_slave_0) entered disabled state [ 984.199093] device bridge_slave_0 entered promiscuous mode [ 984.318674] bridge0: port 2(bridge_slave_1) entered blocking state [ 984.325270] bridge0: port 2(bridge_slave_1) entered disabled state [ 984.355220] device bridge_slave_1 entered promiscuous mode [ 984.486892] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 984.580241] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 984.742428] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 984.756815] audit: type=1326 audit(1529696169.755:2057): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28201 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 984.804862] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 984.992668] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 985.000013] team0: Port device team_slave_0 added [ 985.040204] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 985.047774] team0: Port device team_slave_1 added [ 985.087966] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 985.131289] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 985.169383] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 985.176669] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 985.186152] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 985.222243] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 985.229523] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 985.238712] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 19:36:10 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000080), 0x4) 19:36:10 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) 19:36:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x200000050178}]}) socket$inet(0x2, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040), 0x0) 19:36:10 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e9}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)=""/69, &(0x7f0000000040)=0x45) 19:36:10 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) utimes(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={{0x77359400}}) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000140)) 19:36:10 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f00000001c0)) [ 985.784215] syz-executor1: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 985.795807] syz-executor1 cpuset=syz1 mems_allowed=0 [ 985.801133] CPU: 0 PID: 26939 Comm: syz-executor1 Not tainted 4.17.0+ #9 [ 985.808007] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 985.808591] syz-executor3: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 985.817384] Call Trace: [ 985.817431] dump_stack+0x185/0x1d0 [ 985.817474] warn_alloc+0x430/0x690 [ 985.828766] syz-executor3 cpuset= [ 985.831359] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 985.831419] ? __msan_poison_alloca+0x15c/0x1d0 [ 985.836119] syz3 [ 985.839757] copy_process+0x778/0x9be0 [ 985.843171] mems_allowed=0 [ 985.848091] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 985.848133] ? ptep_set_access_flags+0x10e/0x1d0 [ 985.871868] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 985.877360] ? handle_mm_fault+0x1eb0/0x7ed0 [ 985.881786] ? __msan_poison_alloca+0x141/0x1d0 [ 985.886497] _do_fork+0x353/0xf60 [ 985.889986] __x64_sys_clone+0x15e/0x1b0 [ 985.894071] ? __ia32_sys_vfork+0x70/0x70 [ 985.898235] do_syscall_64+0x15b/0x230 [ 985.902147] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 985.907342] RIP: 0033:0x45414a [ 985.910539] RSP: 002b:0000000000a3ea70 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 985.918265] RAX: ffffffffffffffda RBX: 0000000000a3ea70 RCX: 000000000045414a [ 985.925542] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 985.932825] RBP: 0000000000a3eab0 R08: 0000000000000001 R09: 000000000118b940 [ 985.940103] R10: 000000000118bc10 R11: 0000000000000246 R12: 0000000000000001 [ 985.947382] R13: 0000000000000000 R14: 0000000000000000 R15: 00000000007024c0 [ 985.954695] CPU: 1 PID: 27534 Comm: syz-executor3 Not tainted 4.17.0+ #9 [ 985.955256] warn_alloc_show_mem: 4 callbacks suppressed [ 985.955263] Mem-Info: [ 985.961555] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 985.961567] Call Trace: [ 985.961613] dump_stack+0x185/0x1d0 [ 985.961651] warn_alloc+0x430/0x690 [ 985.967124] active_anon:143232 inactive_anon:75 isolated_anon:0 [ 985.967124] active_file:2039 inactive_file:5423 isolated_file:55 [ 985.967124] unevictable:0 dirty:12 writeback:0 unstable:0 [ 985.967124] slab_reclaimable:3293 slab_unreclaimable:8616 [ 985.967124] mapped:63683 shmem:83 pagetables:1029 bounce:0 [ 985.967124] free:26726 free_pcp:115 free_cma:0 [ 985.969437] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 985.969502] ? __msan_poison_alloca+0x15c/0x1d0 [ 985.978918] Node 0 active_anon:572928kB inactive_anon:300kB active_file:8156kB inactive_file:21692kB unevictable:0kB isolated(anon):0kB isolated(file):220kB mapped:254732kB dirty:48kB writeback:0kB shmem:332kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 247808kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 985.981452] copy_process+0x778/0x9be0 [ 985.981501] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 985.985120] Node 0 [ 985.988725] ? ptep_set_access_flags+0x10e/0x1d0 [ 985.988827] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 986.022989] DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 986.027764] ? handle_mm_fault+0x1eb0/0x7ed0 [ 986.027805] ? __msan_poison_alloca+0x141/0x1d0 [ 986.032492] lowmem_reserve[]: [ 986.060621] _do_fork+0x353/0xf60 [ 986.060674] __x64_sys_clone+0x15e/0x1b0 [ 986.064579] 0 [ 986.070012] ? __ia32_sys_vfork+0x70/0x70 [ 986.070036] do_syscall_64+0x15b/0x230 [ 986.070080] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 986.072311] 2817 [ 986.077036] RIP: 0033:0x45414a [ 986.077050] RSP: 002b:0000000000a3ea70 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 986.077080] RAX: ffffffffffffffda RBX: 0000000000a3ea70 RCX: 000000000045414a [ 986.077095] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 986.077120] RBP: 0000000000a3eab0 R08: 0000000000000001 R09: 00000000012e5940 [ 986.082588] 7244 [ 986.108065] R10: 00000000012e5c10 R11: 0000000000000246 R12: 0000000000000001 [ 986.108079] R13: 0000000000000000 R14: 0000000000000000 R15: 00000000007024c0 [ 986.109239] syz-executor0: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 986.112593] 7244 [ 986.117277] syz-executor0 cpuset=syz0 [ 986.123865] mems_allowed=0 [ 986.123899] CPU: 1 PID: 27539 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 986.127972] Node 0 [ 986.129726] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 986.129737] Call Trace: [ 986.129779] dump_stack+0x185/0x1d0 [ 986.129818] warn_alloc+0x430/0x690 [ 986.134039] DMA32 free:51596kB min:26224kB low:32780kB high:39336kB active_anon:227096kB inactive_anon:24kB active_file:5728kB inactive_file:19472kB unevictable:0kB writepending:24kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1792kB pagetables:1392kB bounce:0kB free_pcp:368kB local_pcp:0kB free_cma:0kB [ 986.137871] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 986.137930] ? __msan_poison_alloca+0x15c/0x1d0 [ 986.143123] lowmem_reserve[]: [ 986.145221] copy_process+0x778/0x9be0 [ 986.145268] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 986.148453] 0 [ 986.156149] ? ptep_set_access_flags+0x10e/0x1d0 [ 986.156178] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 986.156235] ? handle_mm_fault+0x1eb0/0x7ed0 [ 986.163504] 0 [ 986.170752] ? __msan_poison_alloca+0x141/0x1d0 [ 986.170816] _do_fork+0x353/0xf60 [ 986.178087] 4426 [ 986.180143] __x64_sys_clone+0x15e/0x1b0 [ 986.180180] ? __ia32_sys_vfork+0x70/0x70 [ 986.187463] 4426 [ 986.194723] do_syscall_64+0x15b/0x230 [ 986.194762] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 986.194793] RIP: 0033:0x45414a [ 986.208102] RSP: 002b:0000000000a3ea70 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 986.208133] RAX: ffffffffffffffda RBX: 0000000000a3ea70 RCX: 000000000045414a [ 986.208158] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 986.211980] Node 0 [ 986.214865] RBP: 0000000000a3eab0 R08: 0000000000000001 R09: 00000000027bd940 [ 986.214883] R10: 00000000027bdc10 R11: 0000000000000246 R12: 0000000000000001 [ 986.214898] R13: 0000000000000000 R14: 0000000000000000 R15: 00000000007024c0 [ 986.230154] syz-executor4: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 986.233591] Normal free:39404kB min:41208kB low:51508kB high:61808kB active_anon:345832kB inactive_anon:276kB active_file:2156kB inactive_file:2104kB unevictable:0kB writepending:24kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7360kB pagetables:2724kB bounce:0kB free_pcp:92kB local_pcp:92kB free_cma:0kB [ 986.233610] lowmem_reserve[]: [ 986.236230] syz-executor4 cpuset=syz4 [ 986.239899] 0 [ 986.243540] mems_allowed=0 [ 986.272033] 0 0 0 [ 986.272102] Node 0 [ 986.276982] CPU: 1 PID: 4540 Comm: syz-executor4 Not tainted 4.17.0+ #9 [ 986.277006] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 986.281693] DMA: [ 986.284764] Call Trace: [ 986.284812] dump_stack+0x185/0x1d0 [ 986.284852] warn_alloc+0x430/0x690 [ 986.288746] 0*4kB [ 986.294204] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 986.294263] ? __msan_poison_alloca+0x15c/0x1d0 [ 986.296076] 0*8kB [ 986.300829] copy_process+0x778/0x9be0 [ 986.300875] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 986.306341] 0*16kB [ 986.310741] ? ptep_set_access_flags+0x10e/0x1d0 [ 986.310778] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 986.312587] 1*32kB [ 986.317262] ? handle_mm_fault+0x1eb0/0x7ed0 [ 986.317298] ? __msan_poison_alloca+0x141/0x1d0 [ 986.320771] (U) [ 986.322834] _do_fork+0x353/0xf60 [ 986.322880] __x64_sys_clone+0x15e/0x1b0 [ 986.326940] 2*64kB [ 986.331070] ? __ia32_sys_vfork+0x70/0x70 [ 986.331091] do_syscall_64+0x15b/0x230 [ 986.331133] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 986.333191] (U) [ 986.337043] RIP: 0033:0x45414a [ 986.337057] RSP: 002b:0000000000a3ea70 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 986.337098] RAX: ffffffffffffffda RBX: 0000000000a3ea70 RCX: 000000000045414a [ 986.342304] 1*128kB [ 986.345462] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 986.345479] RBP: 0000000000a3eab0 R08: 0000000000000001 R09: 00000000021c6940 [ 986.345504] R10: 00000000021c6c10 R11: 0000000000000246 R12: 0000000000000001 [ 986.353237] (U) [ 986.360467] R13: 0000000000000000 R14: 0000000000000000 R15: 00000000007024c0 [ 986.364287] syz-fuzzer: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 986.367846] 1*256kB [ 986.370135] syz-fuzzer cpuset= [ 986.377417] (U) [ 986.384710] / mems_allowed=0 [ 986.392066] 0*512kB [ 986.403395] CPU: 1 PID: 5608 Comm: syz-fuzzer Not tainted 4.17.0+ #9 [ 986.432101] 1*1024kB [ 986.435144] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 986.435156] Call Trace: [ 986.435217] dump_stack+0x185/0x1d0 [ 986.439010] (U) [ 986.440789] warn_alloc+0x430/0x690 [ 986.440842] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 986.443765] 1*2048kB [ 986.445915] ? __msan_poison_alloca+0x15c/0x1d0 [ 986.445978] copy_process+0x778/0x9be0 [ 986.448201] (M) [ 986.454944] ? expand_files+0x5b/0xe00 [ 986.454972] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 986.455016] ? expand_files+0xa6/0xe00 [ 986.464395] 3*4096kB [ 986.466429] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 986.466486] ? find_next_zero_bit+0x12b/0x2f0 [ 986.469070] (M) [ 986.472679] ? __msan_poison_alloca+0x140/0x1d0 [ 986.472733] _do_fork+0x353/0xf60 [ 986.476353] = 15904kB [ 986.478497] __x64_sys_clone+0x15e/0x1b0 [ 986.478534] ? __ia32_sys_vfork+0x70/0x70 [ 986.483384] Node 0 [ 986.488038] do_syscall_64+0x15b/0x230 [ 986.488079] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 986.488108] RIP: 0033:0x47fddb [ 986.490331] DMA32: [ 986.494175] RSP: 002b:000000c439510880 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 986.494205] RAX: ffffffffffffffda RBX: 000000c420029880 RCX: 000000000047fddb [ 986.494232] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000004111 [ 986.499704] 152*4kB [ 986.501892] RBP: 000000c439510980 R08: 0000000000000000 R09: 0000000000000000 [ 986.501910] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000475c03 [ 986.501923] R13: 00000000000000fb R14: 00000000000000fb R15: 0000000000000000 [ 986.788252] (ME) 1137*8kB (UME) 499*16kB (M) 72*32kB (ME) 12*64kB (UME) 5*128kB (ME) 5*256kB (ME) 12*512kB (UME) 9*1024kB (UME) 6*2048kB (UM) 0*4096kB = 50328kB [ 986.803533] Node 0 Normal: 2939*4kB (UMEH) 1354*8kB (UMEH) 551*16kB (UMEH) 181*32kB (UMEH) 95*64kB (UMH) 44*128kB (UMH) 9*256kB (UM) 1*512kB (U) 2*1024kB (U) 0*2048kB 0*4096kB = 53772kB [ 986.820988] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 986.829992] 4456 total pagecache pages [ 986.834182] 0 pages in swap cache [ 986.837749] Swap cache stats: add 0, delete 0, find 0/0 [ 986.843178] Free swap = 0kB [ 986.846251] Total swap = 0kB [ 986.849319] 1965969 pages RAM [ 986.852691] 0 pages HighMem/MovableOnly [ 986.857194] 106316 pages reserved [ 987.085871] bridge0: port 2(bridge_slave_1) entered blocking state [ 987.092900] bridge0: port 2(bridge_slave_1) entered forwarding state [ 987.099790] bridge0: port 1(bridge_slave_0) entered blocking state [ 987.106271] bridge0: port 1(bridge_slave_0) entered forwarding state [ 987.192521] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 987.227797] device bridge_slave_1 left promiscuous mode [ 987.233592] bridge0: port 2(bridge_slave_1) entered disabled state 19:36:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) mq_open(&(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0, &(0x7f0000000140)) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f00000001c0)) [ 987.253932] device bridge_slave_0 left promiscuous mode [ 987.259685] bridge0: port 1(bridge_slave_0) entered disabled state 19:36:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x200000050178}]}) socket$inet(0x2, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040), 0x0) 19:36:12 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) utimes(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={{0x77359400}}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000200)={@ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}) [ 987.310965] team0 (unregistering): Port device team_slave_1 removed [ 987.323581] team0 (unregistering): Port device team_slave_0 removed [ 987.336730] bond0 (unregistering): Releasing backup interface bond_slave_1 19:36:12 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e9}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)=""/69, &(0x7f0000000040)=0x45) [ 987.357538] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 987.430434] bond0 (unregistering): Released all slaves [ 987.911584] IPVS: ftp: loaded support on port[0] = 21 [ 987.935237] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 988.035791] IPVS: ftp: loaded support on port[0] = 21 [ 988.069925] IPVS: ftp: loaded support on port[0] = 21 [ 990.017493] device bridge_slave_1 left promiscuous mode [ 990.023317] bridge0: port 2(bridge_slave_1) entered disabled state [ 990.058215] device bridge_slave_0 left promiscuous mode [ 990.063939] bridge0: port 1(bridge_slave_0) entered disabled state [ 990.099886] device bridge_slave_1 left promiscuous mode [ 990.105644] bridge0: port 2(bridge_slave_1) entered disabled state [ 990.130486] device bridge_slave_0 left promiscuous mode [ 990.136277] bridge0: port 1(bridge_slave_0) entered disabled state [ 990.161798] device bridge_slave_1 left promiscuous mode [ 990.167562] bridge0: port 2(bridge_slave_1) entered disabled state [ 990.171446] IPVS: ftp: loaded support on port[0] = 21 [ 990.192171] device bridge_slave_0 left promiscuous mode [ 990.197962] bridge0: port 1(bridge_slave_0) entered disabled state [ 990.286876] team0 (unregistering): Port device team_slave_1 removed [ 990.299550] team0 (unregistering): Port device team_slave_0 removed [ 990.312177] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 990.328943] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 990.370388] bond0 (unregistering): Released all slaves [ 990.393530] team0 (unregistering): Port device team_slave_1 removed [ 990.403432] team0 (unregistering): Port device team_slave_0 removed [ 990.413300] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 990.431223] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 990.456471] bond0 (unregistering): Released all slaves [ 990.478275] team0 (unregistering): Port device team_slave_1 removed [ 990.488541] team0 (unregistering): Port device team_slave_0 removed [ 990.498891] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 990.518288] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 990.543828] bond0 (unregistering): Released all slaves [ 991.250498] bridge0: port 1(bridge_slave_0) entered blocking state [ 991.257162] bridge0: port 1(bridge_slave_0) entered disabled state [ 991.289356] device bridge_slave_0 entered promiscuous mode [ 991.346783] bridge0: port 1(bridge_slave_0) entered blocking state [ 991.353304] bridge0: port 1(bridge_slave_0) entered disabled state [ 991.406172] device bridge_slave_0 entered promiscuous mode [ 991.488438] bridge0: port 2(bridge_slave_1) entered blocking state [ 991.494974] bridge0: port 2(bridge_slave_1) entered disabled state [ 991.537247] device bridge_slave_1 entered promiscuous mode [ 991.579880] bridge0: port 2(bridge_slave_1) entered blocking state [ 991.586465] bridge0: port 2(bridge_slave_1) entered disabled state [ 991.638756] device bridge_slave_1 entered promiscuous mode [ 991.672358] bridge0: port 1(bridge_slave_0) entered blocking state [ 991.678881] bridge0: port 1(bridge_slave_0) entered disabled state [ 991.730608] device bridge_slave_0 entered promiscuous mode [ 991.765604] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 991.881157] syz-executor0: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 991.892565] syz-executor0 cpuset=/ mems_allowed=0 [ 991.897597] CPU: 1 PID: 28272 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 991.904474] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 991.913863] Call Trace: [ 991.916512] dump_stack+0x185/0x1d0 [ 991.920183] warn_alloc+0x430/0x690 [ 991.923891] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 991.928948] ? __msan_poison_alloca+0x15c/0x1d0 [ 991.933725] copy_process+0x778/0x9be0 [ 991.937660] ? prepare_exit_to_usermode+0x271/0x3a0 [ 991.942741] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 991.948125] ? do_signal+0x49f/0x1d20 [ 991.951958] ? __msan_poison_alloca+0x141/0x1d0 [ 991.956690] _do_fork+0x353/0xf60 [ 991.960188] __x64_sys_clone+0x15e/0x1b0 [ 991.964270] ? __ia32_sys_vfork+0x70/0x70 [ 991.968437] do_syscall_64+0x15b/0x230 [ 991.972350] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 991.977553] RIP: 0033:0x41f8b9 [ 991.980747] RSP: 002b:0000000000a3fad0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 991.988483] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000041f8b9 [ 991.995775] RDX: 0000000000a3fadc RSI: 0000000000000000 RDI: 0000000000100011 [ 992.003072] RBP: 0000000000a3fc80 R08: 0000000000a44a60 R09: 000000000000001e [ 992.010355] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000a3fe60 [ 992.017630] R13: 0000000000a3fe28 R14: 0000000000000000 R15: 0000000000000000 [ 992.025149] warn_alloc_show_mem: 4 callbacks suppressed [ 992.025157] Mem-Info: [ 992.033119] active_anon:143235 inactive_anon:77 isolated_anon:0 [ 992.033119] active_file:2743 inactive_file:3739 isolated_file:96 [ 992.033119] unevictable:0 dirty:55 writeback:0 unstable:0 [ 992.033119] slab_reclaimable:3280 slab_unreclaimable:8298 [ 992.033119] mapped:63482 shmem:83 pagetables:1116 bounce:0 [ 992.033119] free:22687 free_pcp:276 free_cma:0 [ 992.066445] Node 0 active_anon:572940kB inactive_anon:308kB active_file:10972kB inactive_file:14696kB unevictable:0kB isolated(anon):0kB isolated(file):388kB mapped:253696kB dirty:220kB writeback:0kB shmem:332kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 247808kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 992.094842] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 992.121128] lowmem_reserve[]: 0 2817 7244 7244 [ 992.125883] Node 0 DMA32 free:49852kB min:26224kB low:32780kB high:39336kB active_anon:227380kB inactive_anon:28kB active_file:9252kB inactive_file:11056kB unevictable:0kB writepending:140kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1856kB pagetables:1620kB bounce:0kB free_pcp:1040kB local_pcp:364kB free_cma:0kB [ 992.155469] lowmem_reserve[]: 0 0 4426 4426 [ 992.159942] Node 0 Normal free:27008kB min:41208kB low:51508kB high:61808kB active_anon:345908kB inactive_anon:280kB active_file:2348kB inactive_file:1020kB unevictable:0kB writepending:80kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7424kB pagetables:2844kB bounce:0kB free_pcp:660kB local_pcp:8kB free_cma:0kB [ 992.189250] lowmem_reserve[]: 0 0 0 0 [ 992.193166] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 992.206664] Node 0 DMA32: 724*4kB (UME) 1787*8kB (M) 508*16kB (UME) 72*32kB (UM) 13*64kB (UME) 5*128kB (ME) 6*256kB (UME) 6*512kB (UME) 7*1024kB (UME) 6*2048kB (UM) 0*4096kB = 53160kB [ 992.223478] Node 0 Normal: 2579*4kB (UMEH) 895*8kB (UME) 216*16kB (UME) 17*32kB (ME) 7*64kB (M) 10*128kB (UM) 9*256kB (UM) 1*512kB (U) 2*1024kB (U) 0*2048kB 0*4096kB = 28068kB [ 992.239566] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 992.248261] 4637 total pagecache pages [ 992.252212] 0 pages in swap cache [ 992.255720] Swap cache stats: add 0, delete 0, find 0/0 [ 992.261145] Free swap = 0kB [ 992.264225] Total swap = 0kB [ 992.267289] 1965969 pages RAM [ 992.270448] 0 pages HighMem/MovableOnly [ 992.274483] 106316 pages reserved [ 993.239003] 8021q: adding VLAN 0 to HW filter on device team0 [ 993.288229] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 993.317931] team0: Port device team_slave_0 added [ 993.561960] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 993.584128] team0: Port device team_slave_1 added [ 993.754448] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 993.761704] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 993.772707] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 993.965948] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 993.973185] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 993.991856] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 994.158501] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 994.166240] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 994.182108] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 994.222353] bridge0: port 1(bridge_slave_0) entered blocking state [ 994.228856] bridge0: port 1(bridge_slave_0) entered disabled state [ 994.257503] device bridge_slave_0 entered promiscuous mode [ 994.336571] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 994.416821] bridge0: port 2(bridge_slave_1) entered blocking state [ 994.423412] bridge0: port 2(bridge_slave_1) entered disabled state [ 994.445392] device bridge_slave_1 entered promiscuous mode [ 994.500866] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 994.581949] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 994.746030] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 995.142847] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 995.198966] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 995.205220] 8021q: adding VLAN 0 to HW filter on device bond0 [ 995.306753] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 995.489678] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 995.496705] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 995.595253] syz-executor3: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 995.607198] syz-executor3 cpuset=/ mems_allowed=0 [ 995.612235] CPU: 0 PID: 28276 Comm: syz-executor3 Not tainted 4.17.0+ #9 [ 995.619128] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 995.628525] Call Trace: [ 995.631172] dump_stack+0x185/0x1d0 [ 995.634839] warn_alloc+0x430/0x690 [ 995.638537] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 995.643464] ? __msan_poison_alloca+0x15c/0x1d0 [ 995.648216] copy_process+0x778/0x9be0 [ 995.652138] ? prepare_exit_to_usermode+0x271/0x3a0 [ 995.657172] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 995.662548] ? do_signal+0x49f/0x1d20 [ 995.666370] ? __msan_poison_alloca+0x141/0x1d0 [ 995.671077] _do_fork+0x353/0xf60 [ 995.674568] __x64_sys_clone+0x15e/0x1b0 [ 995.678659] ? __ia32_sys_vfork+0x70/0x70 [ 995.682815] do_syscall_64+0x15b/0x230 [ 995.686735] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 995.691938] RIP: 0033:0x41f8b9 [ 995.695141] RSP: 002b:0000000000a3fad0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 995.702862] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000041f8b9 [ 995.710152] RDX: 0000000000a3fadc RSI: 0000000000000000 RDI: 0000000000100011 [ 995.717441] RBP: 0000000000a3fc80 R08: 0000000000a44a60 R09: 0000000000000027 [ 995.724718] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000a3fe90 [ 995.731995] R13: 0000000000a3fe28 R14: 0000000000000000 R15: 0000000000000000 [ 995.739396] Mem-Info: [ 995.741973] active_anon:143255 inactive_anon:77 isolated_anon:0 [ 995.741973] active_file:3736 inactive_file:3604 isolated_file:96 [ 995.741973] unevictable:0 dirty:62 writeback:0 unstable:0 [ 995.741973] slab_reclaimable:3280 slab_unreclaimable:8330 [ 995.741973] mapped:60952 shmem:83 pagetables:1065 bounce:0 [ 995.741973] free:26198 free_pcp:188 free_cma:0 [ 995.775363] Node 0 active_anon:572904kB inactive_anon:308kB active_file:14944kB inactive_file:14132kB unevictable:0kB isolated(anon):0kB isolated(file):380kB mapped:243576kB dirty:248kB writeback:0kB shmem:332kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 247808kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 995.803831] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 995.830170] lowmem_reserve[]: 0 2817 7244 7244 [ 995.834907] Node 0 DMA32 free:46192kB min:26224kB low:32780kB high:39336kB active_anon:227040kB inactive_anon:28kB active_file:11312kB inactive_file:12408kB unevictable:0kB writepending:184kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:1440kB bounce:0kB free_pcp:1076kB local_pcp:340kB free_cma:0kB [ 995.864611] lowmem_reserve[]: 0 0 4426 4426 [ 995.869089] Node 0 Normal free:25048kB min:41208kB low:51508kB high:61808kB active_anon:345824kB inactive_anon:280kB active_file:3172kB inactive_file:2064kB unevictable:0kB writepending:84kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7424kB pagetables:2732kB bounce:0kB free_pcp:396kB local_pcp:204kB free_cma:0kB [ 995.898580] lowmem_reserve[]: 0 0 0 0 [ 995.902557] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 995.916074] Node 0 DMA32: 221*4kB (UME) 1662*8kB (UM) 506*16kB (ME) 73*32kB (UM) 13*64kB (ME) 5*128kB (ME) 5*256kB (ME) 6*512kB (UME) 3*1024kB (ME) 6*2048kB (UM) 0*4096kB = 45796kB [ 995.932657] Node 0 Normal: 2086*4kB (ME) 874*8kB (UMEH) 212*16kB (MEH) 19*32kB (UMEH) 8*64kB (UM) 5*128kB (UMH) 1*256kB (H) 0*512kB 0*1024kB 0*2048kB 0*4096kB = 20744kB [ 995.948180] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 995.956856] 5857 total pagecache pages [ 995.960824] 0 pages in swap cache [ 995.964359] Swap cache stats: add 0, delete 0, find 0/0 [ 995.969806] Free swap = 0kB [ 995.972903] Total swap = 0kB [ 995.975994] 1965969 pages RAM [ 995.979152] 0 pages HighMem/MovableOnly [ 995.983185] 106316 pages reserved [ 995.987911] sh: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 995.998426] sh cpuset=/ mems_allowed=0 [ 996.002520] CPU: 1 PID: 28639 Comm: sh Not tainted 4.17.0+ #9 [ 996.008465] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 996.017860] Call Trace: [ 996.020507] dump_stack+0x185/0x1d0 [ 996.024185] warn_alloc+0x430/0x690 [ 996.027887] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 996.032813] ? __msan_poison_alloca+0x15c/0x1d0 [ 996.037585] copy_process+0x778/0x9be0 [ 996.041542] ? kmsan_set_origin_inline+0x6b/0x120 [ 996.046443] ? __msan_poison_alloca+0x15c/0x1d0 [ 996.051153] ? cp_new_stat+0x327/0x9b0 [ 996.055134] ? __msan_poison_alloca+0x141/0x1d0 [ 996.059893] _do_fork+0x353/0xf60 [ 996.063417] __x64_sys_clone+0x15e/0x1b0 [ 996.067554] ? __ia32_sys_vfork+0x70/0x70 [ 996.071756] do_syscall_64+0x15b/0x230 [ 996.075705] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 996.080958] RIP: 0033:0x7fd802df4f46 [ 996.084697] RSP: 002b:00007ffc3f986440 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 996.092459] RAX: ffffffffffffffda RBX: 00007ffc3f986440 RCX: 00007fd802df4f46 [ 996.099765] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 996.107072] RBP: 00007ffc3f986480 R08: 0000000000000000 R09: 00000000000000b6 [ 996.114385] R10: 00007fd8032eb9d0 R11: 0000000000000246 R12: 0000000000000000 [ 996.121702] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 996.130724] sh: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 996.141177] sh cpuset=/ mems_allowed=0 [ 996.145242] CPU: 0 PID: 28638 Comm: sh Not tainted 4.17.0+ #9 [ 996.151155] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 996.160542] Call Trace: [ 996.163187] dump_stack+0x185/0x1d0 [ 996.166870] warn_alloc+0x430/0x690 [ 996.170578] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 996.175517] ? __msan_poison_alloca+0x15c/0x1d0 [ 996.180307] copy_process+0x778/0x9be0 [ 996.184265] ? kmsan_set_origin_inline+0x6b/0x120 [ 996.189157] ? __msan_poison_alloca+0x15c/0x1d0 [ 996.193880] ? cp_new_stat+0x327/0x9b0 [ 996.197842] ? __msan_poison_alloca+0x141/0x1d0 [ 996.202594] _do_fork+0x353/0xf60 [ 996.206125] __x64_sys_clone+0x15e/0x1b0 [ 996.210239] ? __ia32_sys_vfork+0x70/0x70 [ 996.214430] do_syscall_64+0x15b/0x230 [ 996.218374] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 996.223601] RIP: 0033:0x7f7060c4ef46 [ 996.227338] RSP: 002b:00007ffe5d1cbf50 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 996.235100] RAX: ffffffffffffffda RBX: 00007ffe5d1cbf50 RCX: 00007f7060c4ef46 [ 996.242414] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 996.249722] RBP: 00007ffe5d1cbf90 R08: 0000000000000000 R09: 0000000000000034 [ 996.257027] R10: 00007f70611459d0 R11: 0000000000000246 R12: 0000000000000000 [ 996.264333] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 996.615358] device bridge_slave_1 left promiscuous mode [ 996.621202] bridge0: port 2(bridge_slave_1) entered disabled state [ 996.673269] device bridge_slave_0 left promiscuous mode [ 996.679048] bridge0: port 1(bridge_slave_0) entered disabled state [ 996.746008] team0 (unregistering): Port device team_slave_1 removed [ 996.784218] team0 (unregistering): Port device team_slave_0 removed [ 996.813986] bond0 (unregistering): Released all slaves [ 997.007735] audit: type=1326 audit(1529696182.006:2058): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28653 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:36:21 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr}}}}, 0x98) 19:36:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040), 0x0) 19:36:21 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e9}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)=""/69, &(0x7f0000000040)=0x45) 19:36:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) unshare(0x0) personality(0x0) 19:36:21 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000002ac0)) [ 997.659507] IPVS: ftp: loaded support on port[0] = 21 [ 997.707742] IPVS: ftp: loaded support on port[0] = 21 [ 997.814551] IPVS: ftp: loaded support on port[0] = 21 [ 997.818331] IPVS: ftp: loaded support on port[0] = 21 [ 999.316639] device bridge_slave_1 left promiscuous mode [ 999.322423] bridge0: port 2(bridge_slave_1) entered disabled state [ 999.354952] device bridge_slave_0 left promiscuous mode [ 999.360949] bridge0: port 1(bridge_slave_0) entered disabled state [ 999.379761] device bridge_slave_0 left promiscuous mode [ 999.385496] bridge0: port 1(bridge_slave_0) entered disabled state [ 999.399507] device bridge_slave_1 left promiscuous mode [ 999.405246] bridge0: port 2(bridge_slave_1) entered disabled state [ 999.415848] device bridge_slave_0 left promiscuous mode [ 999.421497] bridge0: port 1(bridge_slave_0) entered disabled state [ 999.460438] bond0 (unregistering): Released all slaves [ 999.485620] bond0 (unregistering): Released all slaves [ 999.503269] team0 (unregistering): Port device team_slave_1 removed [ 999.513010] team0 (unregistering): Port device team_slave_0 removed [ 999.522615] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 999.538982] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 999.564909] bond0 (unregistering): Released all slaves [ 1000.230167] kthreadd: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1000.241186] kthreadd cpuset=/ mems_allowed=0 [ 1000.245774] CPU: 1 PID: 2 Comm: kthreadd Not tainted 4.17.0+ #9 [ 1000.251861] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1000.261246] Call Trace: [ 1000.263893] dump_stack+0x185/0x1d0 [ 1000.267562] warn_alloc+0x430/0x690 [ 1000.271251] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1000.276157] ? __msan_poison_alloca+0x15c/0x1d0 [ 1000.280905] copy_process+0x778/0x9be0 [ 1000.284842] ? __list_add_valid+0xb8/0x450 [ 1000.289131] ? pick_next_task_fair+0x22c9/0x2530 [ 1000.293943] ? kthread_blkcg+0xf0/0xf0 [ 1000.297878] ? __msan_poison_alloca+0x140/0x1d0 [ 1000.302606] _do_fork+0x353/0xf60 [ 1000.306119] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 1000.311558] ? balance_callback+0x48/0x260 [ 1000.315846] ? kthread_blkcg+0xf0/0xf0 [ 1000.319784] kernel_thread+0xc6/0xe0 [ 1000.323534] ? kthread_blkcg+0xf0/0xf0 [ 1000.327466] kthreadd+0x5df/0x940 [ 1000.330956] ? kthread_stop+0x680/0x680 [ 1000.334968] ret_from_fork+0x35/0x40 [ 1000.338806] warn_alloc_show_mem: 2 callbacks suppressed [ 1000.338815] Mem-Info: [ 1000.346796] active_anon:143539 inactive_anon:77 isolated_anon:0 [ 1000.346796] active_file:2495 inactive_file:4347 isolated_file:64 [ 1000.346796] unevictable:0 dirty:75 writeback:0 unstable:0 [ 1000.346796] slab_reclaimable:3280 slab_unreclaimable:8066 [ 1000.346796] mapped:60345 shmem:83 pagetables:1118 bounce:0 [ 1000.346796] free:23212 free_pcp:231 free_cma:0 [ 1000.380196] Node 0 active_anon:574156kB inactive_anon:308kB active_file:10096kB inactive_file:15108kB unevictable:0kB isolated(anon):0kB isolated(file):384kB mapped:241380kB dirty:300kB writeback:0kB shmem:332kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 247808kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1000.408612] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1000.434954] lowmem_reserve[]: 0 2817 7244 7244 [ 1000.439683] Node 0 DMA32 free:49980kB min:26224kB low:32780kB high:39336kB active_anon:228140kB inactive_anon:32kB active_file:7744kB inactive_file:11340kB unevictable:0kB writepending:216kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:1628kB bounce:0kB free_pcp:868kB local_pcp:132kB free_cma:0kB [ 1000.469203] lowmem_reserve[]: 0 0 4426 4426 [ 1000.473679] Node 0 Normal free:21236kB min:41208kB low:51508kB high:61808kB active_anon:346068kB inactive_anon:276kB active_file:2124kB inactive_file:4kB unevictable:0kB writepending:84kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7488kB pagetables:2844kB bounce:0kB free_pcp:624kB local_pcp:0kB free_cma:0kB [ 1000.502809] lowmem_reserve[]: 0 0 0 0 [ 1000.506754] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 1000.520278] Node 0 DMA32: 727*4kB (UME) 2054*8kB (M) 505*16kB (UM) 69*32kB (UM) 10*64kB (ME) 1*128kB (E) 1*256kB (E) 1*512kB (E) 3*1024kB (UE) 4*2048kB (UM) 2*4096kB (M) = 50620kB [ 1000.536871] Node 0 Normal: 2420*4kB (UM) 793*8kB (UM) 170*16kB (UM) 1*32kB (U) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 18776kB [ 1000.550487] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1000.559161] 3568 total pagecache pages [ 1000.563137] 0 pages in swap cache [ 1000.566675] Swap cache stats: add 0, delete 0, find 0/0 [ 1000.572116] Free swap = 0kB [ 1000.575215] Total swap = 0kB [ 1000.578314] 1965969 pages RAM [ 1000.581514] 0 pages HighMem/MovableOnly [ 1000.585563] 106316 pages reserved [ 1000.589181] BUG: unable to handle kernel NULL pointer dereference at 00000000000008cc [ 1000.597270] PGD 800000021fa42067 P4D 800000021fa42067 PUD 21fa3b067 PMD 0 [ 1000.604307] Oops: 0002 [#1] SMP PTI [ 1000.607947] Dumping ftrace buffer: [ 1000.611478] (ftrace buffer empty) [ 1000.615182] Modules linked in: [ 1000.618380] CPU: 0 PID: 28795 Comm: ip Not tainted 4.17.0+ #9 [ 1000.624356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1000.633742] RIP: 0010:memset_erms+0x9/0x10 [ 1000.637995] RSP: 0018:ffff880195bceab0 EFLAGS: 00010046 [ 1000.643369] RAX: 0000000000000000 RBX: ffff880087580000 RCX: 0000000000000fb0 [ 1000.650654] RDX: 0000000000000fb0 RSI: 0000000000000000 RDI: 00000000000008cc [ 1000.657938] RBP: ffff880195bceae0 R08: 0000000000000000 R09: 00000000000008cc [ 1000.665232] R10: 0000000000000000 R11: ffffffff813553c0 R12: ffff8800875808d8 [ 1000.672514] R13: 0000000000000000 R14: 0000000000000286 R15: fffffffffffffff4 [ 1000.679801] FS: 00007fec46eb4700(0000) GS:ffff88021fc00000(0000) knlGS:0000000000000000 [ 1000.688040] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1000.693940] CR2: 00000000000008cc CR3: 000000019597e000 CR4: 00000000001406f0 [ 1000.701222] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1000.708504] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1000.715780] Call Trace: [ 1000.718383] ? kmsan_thread_create+0x56/0xb0 [ 1000.722802] __kthread_create_on_node+0x6ba/0x7b0 [ 1000.727657] kthread_create_on_node+0x243/0x270 [ 1000.732339] ? rcu_free_pwq+0x70/0x70 [ 1000.736152] init_rescuer+0x2f2/0x6b0 [ 1000.739963] ? cpus_read_unlock+0x3e/0xb0 [ 1000.744127] __alloc_workqueue_key+0x1e2e/0x23b0 [ 1000.748897] ? mmdrop+0x3f/0xd0 [ 1000.752194] ? full_name_hash+0x236/0x320 [ 1000.756348] bond_init+0x11f/0x750 [ 1000.759894] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 1000.765268] ? dev_get_valid_name+0x727/0x740 [ 1000.769774] ? bond_arp_send_all+0x16b0/0x16b0 [ 1000.774377] register_netdevice+0x2e8/0x2720 [ 1000.778800] ? bond_changelink+0x1d0/0x3230 [ 1000.783132] ? rtnl_create_link+0xe62/0x1060 [ 1000.787555] bond_newlink+0x107/0x1c0 [ 1000.791367] ? bond_validate+0x220/0x220 [ 1000.795436] rtnl_newlink+0x2721/0x37a0 [ 1000.799412] ? rtnl_newlink+0xca5/0x37a0 [ 1000.803478] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 1000.808846] ? strcmp+0x83/0x160 [ 1000.812219] ? rtnl_newlink+0xb4c/0x37a0 [ 1000.816289] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1000.821652] ? rtnl_newlink+0xb64/0x37a0 [ 1000.825733] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1000.831131] ? rtnl_setlink+0x770/0x770 [ 1000.835113] rtnetlink_rcv_msg+0xa44/0x1570 [ 1000.839452] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1000.844833] ? netlink_sendmsg+0x76e/0x1350 [ 1000.849181] ? kmsan_set_origin_inline+0x6b/0x120 [ 1000.854031] ? __msan_poison_alloca+0x15c/0x1d0 [ 1000.858739] ? __should_failslab+0x278/0x2a0 [ 1000.863159] ? kmsan_set_origin_inline+0x6b/0x120 [ 1000.868013] ? kmsan_set_origin+0x9e/0x160 [ 1000.872255] netlink_rcv_skb+0x37e/0x600 [ 1000.876329] ? rtnetlink_bind+0x120/0x120 [ 1000.880491] rtnetlink_rcv+0x50/0x60 [ 1000.884222] netlink_unicast+0x1680/0x1750 [ 1000.888464] ? rtnetlink_net_exit+0xa0/0xa0 [ 1000.892776] netlink_sendmsg+0x104f/0x1350 [ 1000.897013] ? netlink_getsockopt+0xc60/0xc60 [ 1000.901499] ___sys_sendmsg+0xec8/0x1320 [ 1000.905552] ? __fdget+0x4e/0x60 [ 1000.908902] ? __fget_light+0x57/0x700 [ 1000.912779] ? __fdget+0x4e/0x60 [ 1000.916128] ? __fget_light+0x1dc/0x700 [ 1000.920091] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1000.925441] ? __fget_light+0x1f5/0x700 [ 1000.929408] __x64_sys_sendmsg+0x331/0x460 [ 1000.933635] ? ___sys_sendmsg+0x1320/0x1320 [ 1000.937947] do_syscall_64+0x15b/0x230 [ 1000.941824] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1000.947000] RIP: 0033:0x7fec465d5320 [ 1000.950696] RSP: 002b:00007fff7f786698 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1000.958391] RAX: ffffffffffffffda RBX: 00007fff7f78a790 RCX: 00007fec465d5320 [ 1000.965669] RDX: 0000000000000000 RSI: 00007fff7f7866d0 RDI: 0000000000000013 [ 1000.972931] RBP: 00007fff7f7866d0 R08: 0000000000000000 R09: 00007fec468840b0 [ 1000.980203] R10: 0000000000000000 R11: 0000000000000246 R12: 000000005b2d4fbb [ 1000.987461] R13: 0000000000000000 R14: 00000000006395c0 R15: 00007fff7f78af70 [ 1000.994719] Code: 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 f3 48 ab 89 d1 f3 aa 4c 89 c8 c3 90 49 89 f9 40 88 f0 48 89 d1 aa 4c 89 c8 c3 90 49 89 fa 40 0f b6 ce 48 b8 01 01 01 01 01 [ 1001.013853] RIP: memset_erms+0x9/0x10 RSP: ffff880195bceab0 [ 1001.019549] CR2: 00000000000008cc [ 1001.022988] ---[ end trace 98d6764f48bcbd46 ]--- [ 1001.027721] Kernel panic - not syncing: Fatal exception [ 1001.033528] Dumping ftrace buffer: [ 1001.037059] (ftrace buffer empty) [ 1001.040754] Kernel Offset: disabled [ 1001.044362] Rebooting in 86400 seconds..