4, 0xf, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @broadcast=0xffffffff}}}, &(0x7f0000000140)=0x98) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 17:28:50 executing program 0: capset(&(0x7f0000000240)={0x20071026}, &(0x7f0000000280)) unshare(0x20000) [ 813.040175] audit: type=1326 audit(1529688530.038:1599): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19488 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:28:50 executing program 1: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @broadcast=0xffffffff}}}, &(0x7f0000000140)=0x98) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1a, &(0x7f0000000240)={0x0, @in={{0x2}}}, &(0x7f0000000300)=0x90) 17:28:50 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000100)=0xe8) truncate(&(0x7f0000000080)='./file0\x00', 0x0) 17:28:50 executing program 2: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @broadcast=0xffffffff}}}, &(0x7f0000000140)=0x98) r1 = socket$inet_sctp(0x2, 0x0, 0x84) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 17:28:50 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, &(0x7f0000000380)={'eql\x00', {0x2, 0x0, @multicast1=0xe0000001}}) ioctl$TCSETAF(r2, 0x5408, &(0x7f00000003c0)) 17:28:50 executing program 4: r0 = socket$inet6(0xa, 0x80000000006, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000001440), 0x8) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000000), 0x8) 17:28:50 executing program 7: r0 = socket$inet6(0xa, 0x80000000006, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000001440), 0x8) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x5, &(0x7f0000000bc0), 0x4) 17:28:50 executing program 0: capset(&(0x7f0000000240)={0x20071026}, &(0x7f0000000280)) unshare(0x20000) 17:28:50 executing program 1: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @broadcast=0xffffffff}}}, &(0x7f0000000140)=0x98) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000240)={0x0, @in={{0x2}}}, &(0x7f0000000300)=0x90) [ 813.357796] audit: type=1326 audit(1529688530.356:1600): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19511 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:28:50 executing program 2: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @broadcast=0xffffffff}}}, &(0x7f0000000140)=0x98) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 17:28:50 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, &(0x7f0000000380)={'eql\x00', {0x2, 0x0, @multicast1=0xe0000001}}) ioctl$TCSETAF(r2, 0x5408, &(0x7f00000003c0)) 17:28:50 executing program 4: r0 = socket$inet6(0xa, 0x80000000006, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000001440), 0x8) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000000), 0x8) 17:28:50 executing program 0: unshare(0x20000) 17:28:50 executing program 1: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @broadcast=0xffffffff}}}, &(0x7f0000000140)=0x98) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000240)={0x0, @in={{0x2}}}, &(0x7f0000000300)=0x90) 17:28:50 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000140)) ioctl$KDSKBMODE(r2, 0x4b45, &(0x7f0000000240)) 17:28:50 executing program 7: r0 = socket$inet6(0xa, 0x80000000006, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000001440), 0x8) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x5, &(0x7f0000000bc0), 0x4) 17:28:51 executing program 0: unshare(0x20000) 17:28:51 executing program 1: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @broadcast=0xffffffff}}}, &(0x7f0000000140)=0x98) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000240)={0x0, @in={{0x2}}}, &(0x7f0000000300)=0x90) 17:28:51 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000100)=0xe8) truncate(&(0x7f0000000080)='./file0\x00', 0x0) 17:28:51 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, &(0x7f0000000380)={'eql\x00', {0x2, 0x0, @multicast1=0xe0000001}}) ioctl$TCSETAF(r2, 0x5408, &(0x7f00000003c0)) 17:28:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) pwrite64(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0) 17:28:51 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000100)) ioctl$SCSI_IOCTL_GET_IDLUN(r2, 0x5382, &(0x7f0000000280)) 17:28:51 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000140)) ioctl$KDSKBMODE(r2, 0x4b45, &(0x7f0000000240)) 17:28:51 executing program 7: r0 = socket$inet6(0xa, 0x80000000006, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000001440), 0x8) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x5, &(0x7f0000000bc0), 0x4) 17:28:51 executing program 0: unshare(0x20000) 17:28:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000140)) [ 814.363332] audit: type=1326 audit(1529688531.361:1601): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19576 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:28:51 executing program 0: capset(&(0x7f0000000240), &(0x7f0000000280)) unshare(0x20000) 17:28:51 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000140)) ioctl$KDSKBMODE(r2, 0x4b45, &(0x7f0000000240)) 17:28:51 executing program 7: r0 = socket$inet6(0xa, 0x80000000006, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000001440), 0x8) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x5, &(0x7f0000000bc0), 0x4) 17:28:51 executing program 5: bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r0 = accept(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=0x5f) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f0000000380)={'eql\x00', {0x2, 0x0, @multicast1=0xe0000001}}) ioctl$TCSETAF(r1, 0x5408, &(0x7f00000003c0)) 17:28:51 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000100)) ioctl$SCSI_IOCTL_GET_IDLUN(r2, 0x5382, &(0x7f0000000280)) 17:28:51 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000065ffa8)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)) 17:28:51 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2101, 0x0) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f00000014c0)=ANY=[]) ioctl$TIOCLINUX3(r0, 0x541c, &(0x7f0000000040)=0x3) 17:28:51 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000140)) ioctl$KDSKBMODE(r2, 0x4b45, &(0x7f0000000240)) 17:28:52 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$KDSKBMODE(r2, 0x4b45, &(0x7f0000000240)) 17:28:52 executing program 0: capset(&(0x7f0000000240), &(0x7f0000000280)) unshare(0x20000) 17:28:52 executing program 7: r0 = socket$inet6(0xa, 0x80000000006, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000001440), 0x8) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x5, &(0x7f0000000bc0), 0x4) 17:28:52 executing program 5: bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r0 = accept(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=0x5f) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f0000000380)={'eql\x00', {0x2, 0x0, @multicast1=0xe0000001}}) ioctl$TCSETAF(r1, 0x5408, &(0x7f00000003c0)) 17:28:52 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) ioctl(r0, 0x0, &(0x7f0000000140)) r1 = dup(r0) ioctl$PIO_SCRNMAP(r1, 0x4b41, &(0x7f0000001180)) 17:28:52 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000065ffa8)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)) 17:28:52 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000100)) ioctl$SCSI_IOCTL_GET_IDLUN(r2, 0x5382, &(0x7f0000000280)) 17:28:52 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2101, 0x0) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f00000014c0)=ANY=[]) ioctl$TIOCLINUX3(r0, 0x541c, &(0x7f0000000040)=0x3) 17:28:52 executing program 5: bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r0 = accept(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=0x5f) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f0000000380)={'eql\x00', {0x2, 0x0, @multicast1=0xe0000001}}) ioctl$TCSETAF(r1, 0x5408, &(0x7f00000003c0)) 17:28:52 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2101, 0x0) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f00000014c0)=ANY=[]) ioctl$TIOCLINUX3(r0, 0x541c, &(0x7f0000000040)=0x3) 17:28:52 executing program 0: capset(&(0x7f0000000240), &(0x7f0000000280)) unshare(0x20000) 17:28:52 executing program 7: r0 = socket$inet6(0xa, 0x80000000006, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000001440), 0x8) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000bc0), 0x4) 17:28:52 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$KDSKBMODE(r2, 0x4b45, &(0x7f0000000240)) 17:28:52 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000100)) ioctl$SCSI_IOCTL_GET_IDLUN(r2, 0x5382, &(0x7f0000000280)) 17:28:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000000)={'HL\x00'}, &(0x7f00000001c0)=0x1e) 17:28:52 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000065ffa8)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)) 17:28:52 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, &(0x7f0000000380)={'eql\x00', {0x2, 0x0, @multicast1=0xe0000001}}) ioctl$TCSETAF(r2, 0x5408, &(0x7f00000003c0)) 17:28:52 executing program 7: r0 = socket$inet6(0xa, 0x80000000006, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000001440), 0x8) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000bc0), 0x4) 17:28:52 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$KDSKBMODE(r2, 0x4b45, &(0x7f0000000240)) 17:28:52 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$SCSI_IOCTL_GET_IDLUN(r2, 0x5382, &(0x7f0000000280)) 17:28:52 executing program 0: capset(&(0x7f0000000240)={0x20071026}, &(0x7f0000000280)) unshare(0x0) 17:28:52 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2101, 0x0) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f00000014c0)=ANY=[]) ioctl$TIOCLINUX3(r0, 0x541c, &(0x7f0000000040)=0x3) 17:28:52 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000065ffa8)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)) 17:28:52 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) ioctl(r0, 0x0, &(0x7f0000000140)) r1 = dup(r0) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f0000000000)) 17:28:52 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, &(0x7f0000000380)={'eql\x00', {0x2, 0x0, @multicast1=0xe0000001}}) ioctl$TCSETAF(r2, 0x5408, &(0x7f00000003c0)) 17:28:52 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) accept(r0, 0x0, &(0x7f00000000c0)=0x5f) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000140)) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000240)) 17:28:52 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2101, 0x0) ioctl$TIOCLINUX3(r0, 0x541c, &(0x7f0000000040)=0x3) 17:28:52 executing program 0: capset(&(0x7f0000000240)={0x20071026}, &(0x7f0000000280)) unshare(0x0) 17:28:52 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$SCSI_IOCTL_GET_IDLUN(r2, 0x5382, &(0x7f0000000280)) 17:28:53 executing program 7: r0 = socket$inet6(0xa, 0x80000000006, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000001440), 0x8) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000bc0), 0x4) 17:28:53 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000065ffa8)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) accept$alg(r0, 0x0, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) 17:28:53 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) accept(r0, 0x0, &(0x7f00000000c0)=0x5f) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000140)) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000240)) 17:28:53 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, &(0x7f0000000380)={'eql\x00', {0x2, 0x0, @multicast1=0xe0000001}}) ioctl$TCSETAF(r2, 0x5408, &(0x7f00000003c0)) 17:28:53 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) ioctl(r0, 0x0, &(0x7f0000000140)) r1 = dup(r0) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f0000000000)) 17:28:53 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2101, 0x0) ioctl$TIOCLINUX3(r0, 0x541c, &(0x7f0000000040)=0x3) 17:28:53 executing program 0: capset(&(0x7f0000000240)={0x20071026}, &(0x7f0000000280)) unshare(0x0) 17:28:53 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$SCSI_IOCTL_GET_IDLUN(r2, 0x5382, &(0x7f0000000280)) 17:28:53 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000065ffa8)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) accept$alg(r0, 0x0, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) 17:28:53 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) accept(r0, 0x0, &(0x7f00000000c0)=0x5f) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000140)) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000240)) 17:28:53 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) ioctl(r0, 0x0, &(0x7f0000000140)) r1 = dup(r0) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f0000000000)) 17:28:53 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, &(0x7f0000000380)={'eql\x00', {0x2, 0x0, @multicast1=0xe0000001}}) ioctl$TCSETAF(r2, 0x5408, &(0x7f00000003c0)) 17:28:53 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2101, 0x0) ioctl$TIOCLINUX3(r0, 0x541c, &(0x7f0000000040)=0x3) 17:28:53 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) accept(r0, 0x0, &(0x7f00000000c0)=0x5f) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000100)) ioctl$SCSI_IOCTL_GET_IDLUN(0xffffffffffffffff, 0x5382, &(0x7f0000000280)) 17:28:53 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000065ffa8)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) accept$alg(r0, 0x0, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) 17:28:53 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, &(0x7f0000000380)={'eql\x00', {0x2, 0x0, @multicast1=0xe0000001}}) ioctl$TCSETAF(r2, 0x5408, &(0x7f00000003c0)) 17:28:53 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) ioctl(r0, 0x0, &(0x7f0000000140)) r1 = dup(r0) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f0000000000)) 17:28:53 executing program 1: ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000014c0)=ANY=[]) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000040)=0x3) 17:28:53 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f0000000140)) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000240)) 17:28:53 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) accept(r0, 0x0, &(0x7f00000000c0)=0x5f) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000100)) ioctl$SCSI_IOCTL_GET_IDLUN(0xffffffffffffffff, 0x5382, &(0x7f0000000280)) 17:28:53 executing program 1: ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000014c0)=ANY=[]) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000040)=0x3) 17:28:53 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) ioctl(r0, 0x0, &(0x7f0000000140)) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000000)) 17:28:53 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, &(0x7f0000000380)={'eql\x00', {0x2, 0x0, @multicast1=0xe0000001}}) ioctl$TCSETAF(r2, 0x5408, &(0x7f00000003c0)) 17:28:53 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000065ffa8)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)) 17:28:53 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f0000000140)) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000240)) 17:28:53 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) accept(r0, 0x0, &(0x7f00000000c0)=0x5f) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000100)) ioctl$SCSI_IOCTL_GET_IDLUN(0xffffffffffffffff, 0x5382, &(0x7f0000000280)) 17:28:53 executing program 1: ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000014c0)=ANY=[]) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000040)=0x3) 17:28:54 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) ioctl(r0, 0x0, &(0x7f0000000140)) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000000)) 17:28:54 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f0000000140)) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000240)) 17:28:54 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, &(0x7f0000000380)={'eql\x00', {0x2, 0x0, @multicast1=0xe0000001}}) ioctl$TCSETAF(r2, 0x5408, &(0x7f00000003c0)) 17:28:54 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000065ffa8)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)) 17:28:54 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f0000000100)) ioctl$SCSI_IOCTL_GET_IDLUN(r1, 0x5382, &(0x7f0000000280)) 17:28:54 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x0, 0x0) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f00000014c0)=ANY=[]) ioctl$TIOCLINUX3(r0, 0x541c, &(0x7f0000000040)=0x3) 17:28:54 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) ioctl(r0, 0x0, &(0x7f0000000140)) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000000)) 17:28:54 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f0000000100)) ioctl$SCSI_IOCTL_GET_IDLUN(r1, 0x5382, &(0x7f0000000280)) 17:28:54 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000065ffa8)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)) 17:28:54 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, &(0x7f0000000380)={'eql\x00', {0x2, 0x0, @multicast1=0xe0000001}}) ioctl$TCSETAF(r2, 0x5408, &(0x7f00000003c0)) 17:28:54 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000140)) ioctl$KDSKBMODE(r2, 0x4b45, &(0x7f0000000240)) 17:28:54 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup(r0) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f0000000000)) 17:28:54 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x0, 0x0) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f00000014c0)=ANY=[]) ioctl$TIOCLINUX3(r0, 0x541c, &(0x7f0000000040)=0x3) 17:28:54 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f0000000100)) ioctl$SCSI_IOCTL_GET_IDLUN(r1, 0x5382, &(0x7f0000000280)) 17:28:54 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000065ffa8)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) ioctl(r0, 0x0, &(0x7f0000000000)) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)) 17:28:54 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, &(0x7f0000000380)={'eql\x00', {0x2, 0x0, @multicast1=0xe0000001}}) ioctl$TCSETAF(r2, 0x5408, &(0x7f00000003c0)) 17:28:54 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000140)) ioctl$KDSKBMODE(r2, 0x4b45, &(0x7f0000000240)) 17:28:54 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000065ffa8)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) ioctl(r0, 0x0, &(0x7f0000000000)) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)) 17:28:54 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup(r0) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f0000000000)) 17:28:54 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, &(0x7f0000000380)={'eql\x00', {0x2, 0x0, @multicast1=0xe0000001}}) ioctl$TCSETAF(r2, 0x5408, &(0x7f00000003c0)) 17:28:54 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000100)) ioctl$SCSI_IOCTL_GET_IDLUN(r2, 0x5382, &(0x7f0000000280)) 17:28:54 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x0, 0x0) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f00000014c0)=ANY=[]) ioctl$TIOCLINUX3(r0, 0x541c, &(0x7f0000000040)=0x3) 17:28:54 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000140)) ioctl$KDSKBMODE(r2, 0x4b45, &(0x7f0000000240)) 17:28:54 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup(r0) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f0000000000)) 17:28:54 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, &(0x7f0000000380)={'eql\x00', {0x2, 0x0, @multicast1=0xe0000001}}) ioctl$TCSETAF(r2, 0x5408, &(0x7f00000003c0)) 17:28:54 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000065ffa8)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) ioctl(r0, 0x0, &(0x7f0000000000)) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)) 17:28:54 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000100)) ioctl$SCSI_IOCTL_GET_IDLUN(r2, 0x5382, &(0x7f0000000280)) 17:28:54 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2101, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000014c0)=ANY=[]) ioctl$TIOCLINUX3(r0, 0x541c, &(0x7f0000000040)=0x3) 17:28:54 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r0 = accept(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=0x5f) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f0000000140)) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000240)) 17:28:54 executing program 6: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000140)) r0 = dup(0xffffffffffffffff) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f0000000000)) 17:28:55 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, &(0x7f0000000380)={'eql\x00', {0x2, 0x0, @multicast1=0xe0000001}}) ioctl$TCSETAF(r2, 0x5408, &(0x7f00000003c0)) 17:28:55 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000100)) ioctl$SCSI_IOCTL_GET_IDLUN(r2, 0x5382, &(0x7f0000000280)) 17:28:55 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept$alg(r0, 0x0, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)) 17:28:55 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2101, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000014c0)=ANY=[]) ioctl$TIOCLINUX3(r0, 0x541c, &(0x7f0000000040)=0x3) 17:28:55 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) ioctl(r0, 0x0, &(0x7f0000000440)) r1 = dup(r0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000040)=""/220) 17:28:55 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f00000001c0)) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) 17:28:55 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r0 = accept(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=0x5f) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f0000000140)) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000240)) 17:28:55 executing program 6: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000140)) r0 = dup(0xffffffffffffffff) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f0000000000)) 17:28:55 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000380)={'eql\x00', {0x2, 0x0, @multicast1=0xe0000001}}) ioctl$TCSETAF(r2, 0x5408, &(0x7f00000003c0)) 17:28:55 executing program 2: bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r0 = accept(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=0x5f) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f0000000100)) ioctl$SCSI_IOCTL_GET_IDLUN(r1, 0x5382, &(0x7f0000000280)) 17:28:55 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f00000001c0)) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) 17:28:55 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) ioctl(r0, 0x0, &(0x7f0000000140)) r1 = dup(r0) ioctl$EVIOCGPROP(r1, 0x80404509, &(0x7f0000000000)=""/147) 17:28:55 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept$alg(r0, 0x0, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)) 17:28:55 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2101, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000014c0)=ANY=[]) ioctl$TIOCLINUX3(r0, 0x541c, &(0x7f0000000040)=0x3) 17:28:55 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r0 = accept(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=0x5f) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f0000000140)) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000240)) 17:28:55 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000380)={'eql\x00', {0x2, 0x0, @multicast1=0xe0000001}}) ioctl$TCSETAF(r2, 0x5408, &(0x7f00000003c0)) 17:28:55 executing program 6: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000140)) r0 = dup(0xffffffffffffffff) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f0000000000)) 17:28:55 executing program 2: bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r0 = accept(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=0x5f) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f0000000100)) ioctl$SCSI_IOCTL_GET_IDLUN(r1, 0x5382, &(0x7f0000000280)) 17:28:55 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f00000001c0)) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) 17:28:55 executing program 7: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) 17:28:55 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept$alg(r0, 0x0, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)) 17:28:55 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2101, 0x0) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f00000014c0)=ANY=[]) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000040)=0x3) 17:28:55 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000140)) ioctl$KDSKBMODE(r2, 0x4b45, &(0x7f0000000240)) 17:28:55 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000140)) r1 = dup(r0) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f0000000000)) 17:28:55 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000380)={'eql\x00', {0x2, 0x0, @multicast1=0xe0000001}}) ioctl$TCSETAF(r2, 0x5408, &(0x7f00000003c0)) 17:28:55 executing program 2: bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r0 = accept(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=0x5f) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f0000000100)) ioctl$SCSI_IOCTL_GET_IDLUN(r1, 0x5382, &(0x7f0000000280)) 17:28:55 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f00000001c0)) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) 17:28:55 executing program 7: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f00000001c0)) ioctl$SCSI_IOCTL_START_UNIT(r0, 0x5) 17:28:55 executing program 4: bind$alg(0xffffffffffffffff, &(0x7f000065ffa8)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)) 17:28:55 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2101, 0x0) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f00000014c0)=ANY=[]) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000040)=0x3) 17:28:55 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000140)) ioctl$KDSKBMODE(r2, 0x4b45, &(0x7f0000000240)) 17:28:55 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000140)) r1 = dup(r0) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f0000000000)) 17:28:56 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, &(0x7f0000000380)={'eql\x00', {0x2, 0x0, @multicast1=0xe0000001}}) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f00000003c0)) 17:28:56 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000100)) ioctl$SCSI_IOCTL_GET_IDLUN(r2, 0x5382, &(0x7f0000000280)) 17:28:56 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) 17:28:56 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000140)) ioctl$KDSKBMODE(r2, 0x4b45, &(0x7f0000000240)) 17:28:56 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) ioctl(r0, 0x0, &(0x7f0000000140)) r1 = dup(r0) ioctl$SG_GET_TIMEOUT(r1, 0x2202, 0x0) 17:28:56 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, &(0x7f0000000380)={'eql\x00', {0x2, 0x0, @multicast1=0xe0000001}}) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f00000003c0)) 17:28:56 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000100)) ioctl$SCSI_IOCTL_GET_IDLUN(r2, 0x5382, &(0x7f0000000280)) 17:28:56 executing program 4: bind$alg(0xffffffffffffffff, &(0x7f000065ffa8)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)) 17:28:56 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000140)) r1 = dup(r0) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f0000000000)) 17:28:56 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2101, 0x0) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f00000014c0)=ANY=[]) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000040)=0x3) 17:28:56 executing program 7: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f00000014c0)=ANY=[]) ioctl$PPPIOCGMRU(r0, 0x80047453, &(0x7f0000000080)) 17:28:56 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) 17:28:56 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000100)) ioctl$SCSI_IOCTL_GET_IDLUN(r2, 0x5382, &(0x7f0000000280)) 17:28:56 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000140)) ioctl$KDSKBMODE(r2, 0x4b45, &(0x7f0000000240)) 17:28:56 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) ioctl(r0, 0x0, &(0x7f0000000140)) r1 = dup(0xffffffffffffffff) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f0000000000)) 17:28:56 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xc01, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000400)='\x00\x00\x00\x00\x00\x00\x00') ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f00000000c0)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)='gretap0\x00'}) 17:28:56 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, &(0x7f0000000380)={'eql\x00', {0x2, 0x0, @multicast1=0xe0000001}}) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f00000003c0)) 17:28:56 executing program 4: bind$alg(0xffffffffffffffff, &(0x7f000065ffa8)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)) 17:28:56 executing program 7: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f00000014c0)=ANY=[]) ioctl$PPPIOCGMRU(r0, 0x80047453, &(0x7f0000000080)) 17:28:56 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000140)) ioctl$KDSKBMODE(r2, 0x4b45, &(0x7f0000000240)) 17:28:56 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) 17:28:56 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) ioctl(r0, 0x0, &(0x7f0000000140)) r1 = dup(0xffffffffffffffff) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f0000000000)) 17:28:56 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000100)) ioctl$SCSI_IOCTL_GET_IDLUN(r2, 0x5382, &(0x7f0000000280)) 17:28:56 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xc01, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000400)='\x00\x00\x00\x00\x00\x00\x00') ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f00000000c0)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)='gretap0\x00'}) 17:28:56 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) ioctl(r0, 0x0, &(0x7f0000000140)) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000140)="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") 17:28:56 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f000065ffa8)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)) 17:28:56 executing program 0: ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000001c0)) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) 17:28:56 executing program 7: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000340)={{}, 'port0\x00'}) ioctl$TIOCNOTTY(r0, 0x5422) 17:28:56 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000140)) ioctl$KDSKBMODE(r2, 0x4b45, &(0x7f0000000240)) 17:28:56 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) ioctl(r0, 0x0, &(0x7f0000000140)) r1 = dup(0xffffffffffffffff) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f0000000000)) 17:28:56 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000100)) ioctl$SCSI_IOCTL_GET_IDLUN(r2, 0x5382, &(0x7f0000000280)) 17:28:57 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xc01, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000400)='\x00\x00\x00\x00\x00\x00\x00') ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f00000000c0)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)='gretap0\x00'}) 17:28:57 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) ioctl(r0, 0x0, &(0x7f0000000140)) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000140)="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") 17:28:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f000065ffa8)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)) 17:28:57 executing program 0: ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000001c0)) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) 17:28:57 executing program 7: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000340)={{}, 'port0\x00'}) ioctl$TIOCNOTTY(r0, 0x5422) 17:28:57 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) ioctl(r0, 0x0, &(0x7f0000000140)) r1 = dup(r0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000000)) 17:28:57 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000100)) ioctl$SCSI_IOCTL_GET_IDLUN(r2, 0x5382, &(0x7f0000000280)) 17:28:57 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) ioctl(r0, 0x0, &(0x7f0000000140)) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000140)="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") 17:28:57 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000140)) ioctl$KDSKBMODE(r2, 0x4b45, &(0x7f0000000240)) 17:28:57 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xc01, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000400)='\x00\x00\x00\x00\x00\x00\x00') ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f00000000c0)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)='gretap0\x00'}) 17:28:57 executing program 0: ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000001c0)) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) 17:28:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f000065ffa8)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)) 17:28:57 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) ioctl(r0, 0x0, &(0x7f0000000140)) r1 = dup(r0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000000)) 17:28:57 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000100)) ioctl$SCSI_IOCTL_GET_IDLUN(r2, 0x5382, &(0x7f0000000280)) 17:28:57 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) ioctl(r0, 0x0, &(0x7f0000000140)) r1 = dup(r0) ioctl$EVIOCGID(r1, 0x80084502, &(0x7f0000000180)=""/4096) 17:28:57 executing program 7: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000340)={{}, 'port0\x00'}) ioctl$TIOCNOTTY(r0, 0x5422) 17:28:57 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000140)) ioctl$KDSKBMODE(r2, 0x4b45, &(0x7f0000000240)) 17:28:57 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xc01, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f00000000c0)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)='gretap0\x00'}) 17:28:57 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f00000001c0)) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) 17:28:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000065ffa8)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)) 17:28:57 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) ioctl(r0, 0x0, &(0x7f0000000140)) r1 = dup(r0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000000)) 17:28:57 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000100)) ioctl$SCSI_IOCTL_GET_IDLUN(r2, 0x5382, &(0x7f0000000280)) 17:28:57 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) ioctl(r0, 0x0, &(0x7f0000000140)) r1 = dup(r0) ioctl$EVIOCGID(r1, 0x80084502, &(0x7f0000000180)=""/4096) 17:28:57 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xc01, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f00000000c0)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)='gretap0\x00'}) 17:28:57 executing program 7: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000340)={{}, 'port0\x00'}) ioctl$TIOCNOTTY(r0, 0x5422) 17:28:57 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f00000001c0)) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) 17:28:57 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000140)) ioctl$KDSKBMODE(r2, 0x4b45, &(0x7f0000000240)) 17:28:57 executing program 6: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$EVIOCGABS0(r0, 0x80184540, &(0x7f0000000080)=""/127) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000000)) 17:28:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000065ffa8)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)) 17:28:58 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) ioctl(r0, 0x0, &(0x7f0000000140)) r1 = dup(r0) ioctl$EVIOCGID(r1, 0x80084502, &(0x7f0000000180)=""/4096) 17:28:58 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xc01, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f00000000c0)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)='gretap0\x00'}) 17:28:58 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000100)) ioctl$SCSI_IOCTL_GET_IDLUN(r2, 0x5382, &(0x7f0000000280)) 17:28:58 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f00000001c0)) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) 17:28:58 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) r1 = dup2(r0, r0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000040)='posix_acl_accesswlan1\x00') 17:28:58 executing program 7: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$TIOCNOTTY(r0, 0x5422) 17:28:58 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000065ffa8)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)) 17:28:58 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000140)) ioctl$KDSKBMODE(r2, 0x4b45, &(0x7f0000000240)) 17:28:58 executing program 1: ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000400)='\x00\x00\x00\x00\x00\x00\x00') ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f00000000c0)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)='gretap0\x00'}) 17:28:58 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) ioctl(r0, 0x0, &(0x7f0000000140)) r1 = dup(r0) ioctl$EVIOCGID(r1, 0x80084502, &(0x7f0000000180)=""/4096) 17:28:58 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000100)) ioctl$SCSI_IOCTL_GET_IDLUN(r2, 0x5382, &(0x7f0000000280)) 17:28:58 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000006100)) ioctl$TIOCGPTPEER(r1, 0x5441, 0x0) 17:28:58 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000001c0)) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) 17:28:58 executing program 7: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$TIOCNOTTY(r0, 0x5422) 17:28:58 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000065ffa8)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)) 17:28:58 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000140)) ioctl$KDSKBMODE(r2, 0x4b45, &(0x7f0000000240)) 17:28:58 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) ioctl(r0, 0x0, &(0x7f0000000140)) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000180)=""/4096) 17:28:58 executing program 1: ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000400)='\x00\x00\x00\x00\x00\x00\x00') ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f00000000c0)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)='gretap0\x00'}) 17:28:58 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000006100)) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) 17:28:58 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000001c0)) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) 17:28:58 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000100)) ioctl$SCSI_IOCTL_GET_IDLUN(r2, 0x5382, &(0x7f0000000280)) 17:28:58 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000065ffa8)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)) 17:28:58 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000140)) ioctl$KDSKBMODE(r2, 0x4b45, &(0x7f0000000240)) 17:28:58 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) ioctl(r0, 0x0, &(0x7f0000000140)) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000180)=""/4096) 17:28:58 executing program 7: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$TIOCNOTTY(r0, 0x5422) 17:28:58 executing program 1: ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000400)='\x00\x00\x00\x00\x00\x00\x00') ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f00000000c0)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)='gretap0\x00'}) 17:28:58 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000006100)) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) 17:28:58 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000001c0)) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) 17:28:59 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) ioctl(r0, 0x0, &(0x7f0000000140)) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000180)=""/4096) 17:28:59 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000400)='\x00\x00\x00\x00\x00\x00\x00') ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f00000000c0)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)='gretap0\x00'}) 17:28:59 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000140)) ioctl$KDSKBMODE(r2, 0x4b45, &(0x7f0000000240)) 17:28:59 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000100)) ioctl$SCSI_IOCTL_GET_IDLUN(r2, 0x5382, &(0x7f0000000280)) 17:28:59 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000065ffa8)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)) 17:28:59 executing program 7: ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000340)={{}, 'port0\x00'}) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) 17:28:59 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000006100)) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) 17:28:59 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f00000001c0)) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) 17:28:59 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup(r0) ioctl$EVIOCGID(r1, 0x80084502, &(0x7f0000000180)=""/4096) 17:28:59 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000400)='\x00\x00\x00\x00\x00\x00\x00') ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f00000000c0)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)='gretap0\x00'}) 17:28:59 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000140)) ioctl$KDSKBMODE(r2, 0x4b45, &(0x7f0000000240)) 17:28:59 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000100)) ioctl$SCSI_IOCTL_GET_IDLUN(r2, 0x5382, &(0x7f0000000280)) 17:28:59 executing program 7: ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000340)={{}, 'port0\x00'}) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) 17:28:59 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000065ffa8)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)) 17:28:59 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000006100)) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) 17:28:59 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f00000001c0)) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) 17:28:59 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup(r0) ioctl$EVIOCGID(r1, 0x80084502, &(0x7f0000000180)=""/4096) 17:28:59 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000400)='\x00\x00\x00\x00\x00\x00\x00') ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f00000000c0)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)='gretap0\x00'}) 17:28:59 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000140)) ioctl$KDSKBMODE(r2, 0x4b45, &(0x7f0000000240)) 17:28:59 executing program 7: ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000340)={{}, 'port0\x00'}) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) 17:28:59 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000100)) ioctl$SCSI_IOCTL_GET_IDLUN(r2, 0x5382, &(0x7f0000000280)) 17:28:59 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000065ffa8)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)) 17:28:59 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) 17:28:59 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup(r0) ioctl$EVIOCGID(r1, 0x80084502, &(0x7f0000000180)=""/4096) 17:28:59 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f00000001c0)) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) 17:28:59 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xc01, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000400)='\x00\x00\x00\x00\x00\x00\x00') ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f00000000c0)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)='gretap0\x00'}) 17:28:59 executing program 7: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000340)={{}, 'port0\x00'}) ioctl$TIOCNOTTY(r0, 0x5422) 17:28:59 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000100)) ioctl$SCSI_IOCTL_GET_IDLUN(r2, 0x5382, &(0x7f0000000280)) 17:28:59 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000140)) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000240)) 17:28:59 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) 17:28:59 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000065ffa8)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)) 17:29:00 executing program 5: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000140)) r0 = dup(0xffffffffffffffff) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f0000000180)=""/4096) 17:29:00 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000001c0)) 17:29:00 executing program 7: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000340)={{}, 'port0\x00'}) ioctl$TIOCNOTTY(r0, 0x5422) 17:29:00 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xc01, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000400)='\x00\x00\x00\x00\x00\x00\x00') ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f00000000c0)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)='gretap0\x00'}) 17:29:00 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) 17:29:00 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000140)) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000240)) 17:29:00 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000100)) ioctl$SCSI_IOCTL_GET_IDLUN(0xffffffffffffffff, 0x5382, &(0x7f0000000280)) 17:29:00 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000065ffa8)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)) r2 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)) 17:29:00 executing program 5: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000140)) r0 = dup(0xffffffffffffffff) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f0000000180)=""/4096) 17:29:00 executing program 6: socket$key(0xf, 0x3, 0x2) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000006100)) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 17:29:00 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xc01, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000400)='\x00\x00\x00\x00\x00\x00\x00') ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f00000000c0)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)='gretap0\x00'}) 17:29:00 executing program 7: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000340)={{}, 'port0\x00'}) ioctl$TIOCNOTTY(r0, 0x5422) 17:29:00 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000140)) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000240)) 17:29:00 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000100)) ioctl$SCSI_IOCTL_GET_IDLUN(0xffffffffffffffff, 0x5382, &(0x7f0000000280)) 17:29:00 executing program 5: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000140)) r0 = dup(0xffffffffffffffff) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f0000000180)=""/4096) 17:29:00 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000065ffa8)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)) r2 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)) 17:29:00 executing program 6: socket$key(0xf, 0x3, 0x2) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000006100)) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 17:29:00 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000006100)) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000500)) 17:29:00 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xc01, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000400)='\x00\x00\x00\x00\x00\x00\x00') ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f00000000c0)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)='gretap0\x00'}) 17:29:00 executing program 7: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000340)={{}, 'port0\x00'}) ioctl$TIOCNOTTY(r0, 0x5422) 17:29:00 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000001c0)) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000000)) 17:29:00 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000100)) ioctl$SCSI_IOCTL_GET_IDLUN(0xffffffffffffffff, 0x5382, &(0x7f0000000280)) 17:29:00 executing program 6: socket$key(0xf, 0x3, 0x2) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000006100)) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 17:29:00 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000140)) r1 = dup(r0) ioctl$EVIOCGID(r1, 0x80084502, &(0x7f0000000180)=""/4096) 17:29:00 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000065ffa8)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)) r2 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)) 17:29:00 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xc01, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000400)='\x00\x00\x00\x00\x00\x00\x00') ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f00000000c0)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)='gretap0\x00'}) 17:29:00 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000006100)) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000500)) 17:29:00 executing program 7: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000340)={{}, 'port0\x00'}) ioctl$TIOCNOTTY(r0, 0x5422) 17:29:00 executing program 6: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000006100)) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) 17:29:00 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000001c0)) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000000)) 17:29:01 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000140)) r1 = dup(r0) ioctl$EVIOCGID(r1, 0x80084502, &(0x7f0000000180)=""/4096) 17:29:01 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000065ffa8)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) 17:29:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000080)=""/209) 17:29:01 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xc01, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000400)='\x00\x00\x00\x00\x00\x00\x00') ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f00000000c0)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)='gretap0\x00'}) 17:29:01 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000006100)) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000500)) 17:29:01 executing program 6: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000006100)) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) 17:29:01 executing program 7: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000340)={{}, 'port0\x00'}) ioctl$TIOCNOTTY(r0, 0x5422) 17:29:01 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000001c0)) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000000)) 17:29:01 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000140)) r1 = dup(r0) ioctl$EVIOCGID(r1, 0x80084502, &(0x7f0000000180)=""/4096) 17:29:01 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) accept$unix(0xffffffffffffff9c, &(0x7f00000000c0), &(0x7f0000000180)=0x6e) 17:29:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)={'#! ', './file0/file0', [], 0xa}, 0x11) 17:29:01 executing program 6: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000006100)) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) 17:29:01 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000065ffa8)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) 17:29:01 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000006100)) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000500)) 17:29:01 executing program 7: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000340)={{}, 'port0\x00'}) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) 17:29:01 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) ioctl(r0, 0x0, &(0x7f0000000140)) r1 = dup(0xffffffffffffffff) ioctl$EVIOCGID(r1, 0x80084502, &(0x7f0000000180)=""/4096) 17:29:01 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000001c0)) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000000)) 17:29:01 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(0xffffffffffffffff, r0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000006100)) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) 17:29:01 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x0) 17:29:01 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000500)) 17:29:01 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000065ffa8)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) 17:29:01 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) ioctl(r0, 0x0, &(0x7f0000000140)) r1 = dup(0xffffffffffffffff) ioctl$EVIOCGID(r1, 0x80084502, &(0x7f0000000180)=""/4096) 17:29:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)={'#! ', './file0/file0', [], 0xa}, 0x11) 17:29:01 executing program 7: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000340)={{}, 'port0\x00'}) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) 17:29:01 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(0xffffffffffffffff, r0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000006100)) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) 17:29:01 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000000)) 17:29:01 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000500)) 17:29:01 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) ioctl(r0, 0x0, &(0x7f0000000140)) r1 = dup(0xffffffffffffffff) ioctl$EVIOCGID(r1, 0x80084502, &(0x7f0000000180)=""/4096) 17:29:01 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x0) 17:29:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000380)={'mangle\x00', 0x2, [{}, {}]}, 0x48) clock_gettime(0x0, &(0x7f0000000040)) 17:29:02 executing program 7: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000340)={{}, 'port0\x00'}) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) 17:29:02 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(0xffffffffffffffff, r0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000006100)) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) 17:29:02 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000000)) 17:29:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)={'#! ', './file0/file0', [], 0xa}, 0x11) 17:29:02 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) ioctl(r0, 0x0, &(0x7f0000000140)) r1 = dup(r0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000180)=""/4096) 17:29:02 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000500)) 17:29:02 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, 0xffffffffffffffff) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000006100)) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) 17:29:02 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000001c0)=""/172) 17:29:02 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000000)) 17:29:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x0) 17:29:02 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) ioctl(r0, 0x0, &(0x7f0000000140)) r1 = dup(r0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000180)=""/4096) 17:29:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000200)={@remote={0xfe, 0x80, [], 0xbb}}) 17:29:02 executing program 0: socket$key(0xf, 0x3, 0x2) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000006100)) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000500)) 17:29:02 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, 0xffffffffffffffff) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000006100)) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) 17:29:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)={'#! ', './file0/file0', [], 0xa}, 0x11) 17:29:02 executing program 3: socket$key(0xf, 0x3, 0x2) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000001c0)) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000000)) 17:29:02 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, 0xffffffffffffffff) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000006100)) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) 17:29:02 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000001c0)=""/172) 17:29:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x0) 17:29:02 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) ioctl(r0, 0x0, &(0x7f0000000140)) r1 = dup(r0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000180)=""/4096) 17:29:02 executing program 0: socket$key(0xf, 0x3, 0x2) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000006100)) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000500)) 17:29:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)={'#! ', './file0/file0', [], 0xa}, 0x11) 17:29:02 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000006100)) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) 17:29:02 executing program 3: socket$key(0xf, 0x3, 0x2) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000001c0)) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000000)) 17:29:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000200)={@remote={0xfe, 0x80, [], 0xbb}}) 17:29:02 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000001c0)=""/172) 17:29:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000100), 0x0) 17:29:03 executing program 0: socket$key(0xf, 0x3, 0x2) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000006100)) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000500)) 17:29:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x0) 17:29:03 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000006100)) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) 17:29:03 executing program 3: socket$key(0xf, 0x3, 0x2) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000001c0)) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000000)) 17:29:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)={'#! ', './file0/file0', [], 0xa}, 0x11) 17:29:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000001c0)=""/172) 17:29:03 executing program 0: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000006100)) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000500)) 17:29:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000200)={@remote={0xfe, 0x80, [], 0xbb}}) 17:29:03 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000006100)) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) 17:29:03 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000000)) 17:29:03 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000100), 0x0) 17:29:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x0) 17:29:03 executing program 0: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000006100)) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000500)) 17:29:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)={'#! ', './file0/file0', [], 0xa}, 0x11) 17:29:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000200)={@remote={0xfe, 0x80, [], 0xbb}}) 17:29:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000001c0)=""/172) 17:29:03 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000006100)) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 17:29:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x0) 17:29:03 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000000)) 17:29:03 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000100), 0x0) 17:29:03 executing program 0: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000006100)) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000500)) 17:29:03 executing program 2: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)={'#! ', './file0/file0', [], 0xa}, 0x11) 17:29:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000001c0)=""/172) 17:29:03 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000006100)) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 17:29:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000200)={@remote={0xfe, 0x80, [], 0xbb}}) 17:29:03 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000000)) 17:29:03 executing program 1: socket(0x0, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x0) 17:29:03 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(0xffffffffffffffff, r0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000006100)) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000500)) 17:29:04 executing program 2: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)={'#! ', './file0/file0', [], 0xa}, 0x11) 17:29:04 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000100), 0x0) 17:29:04 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000006100)) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 17:29:04 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(0xffffffffffffffff, r0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000001c0)) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000000)) 17:29:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000001c0)=""/172) 17:29:04 executing program 1: socket(0x0, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x0) 17:29:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000200)={@remote={0xfe, 0x80, [], 0xbb}}) 17:29:04 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(0xffffffffffffffff, r0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000006100)) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000500)) 17:29:04 executing program 2: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)={'#! ', './file0/file0', [], 0xa}, 0x11) 17:29:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000140)) 17:29:04 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000100), 0x0) 17:29:04 executing program 1: socket(0x0, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x0) 17:29:04 executing program 7: pipe2(&(0x7f0000000040), 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000001c0)=""/172) 17:29:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000200)={@remote={0xfe, 0x80, [], 0xbb}}) 17:29:04 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(0xffffffffffffffff, r0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000001c0)) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000000)) 17:29:04 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(0xffffffffffffffff, r0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000006100)) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000500)) 17:29:04 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)={'#! ', './file0/file0', [], 0xa}, 0x11) 17:29:04 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000100), 0x0) 17:29:04 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x0) 17:29:04 executing program 7: pipe2(&(0x7f0000000040), 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000001c0)=""/172) 17:29:04 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(0xffffffffffffffff, r0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000001c0)) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000000)) 17:29:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000140)) 17:29:04 executing program 4: socket$inet6(0xa, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000200)={@remote={0xfe, 0x80, [], 0xbb}}) 17:29:04 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, 0xffffffffffffffff) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000006100)) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000500)) 17:29:04 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)={'#! ', './file0/file0', [], 0xa}, 0x11) 17:29:04 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000100), 0x0) 17:29:04 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x0) 17:29:04 executing program 7: pipe2(&(0x7f0000000040), 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000001c0)=""/172) 17:29:05 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, 0xffffffffffffffff) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000001c0)) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000000)) 17:29:05 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)={'#! ', './file0/file0', [], 0xa}, 0x11) 17:29:05 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000140)) 17:29:05 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, 0xffffffffffffffff) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000006100)) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000500)) 17:29:05 executing program 4: socket$inet6(0xa, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000200)={@remote={0xfe, 0x80, [], 0xbb}}) 17:29:05 executing program 5: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000100), 0x0) 17:29:05 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, 0xffffffffffffffff) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000001c0)) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000000)) 17:29:05 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x0) 17:29:05 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000001c0)=""/172) 17:29:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)={'#! ', './file0/file0', [], 0xa}, 0x11) 17:29:05 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, 0xffffffffffffffff) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000006100)) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000500)) 17:29:05 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000140)) 17:29:05 executing program 5: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000100), 0x0) 17:29:05 executing program 4: socket$inet6(0xa, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000200)={@remote={0xfe, 0x80, [], 0xbb}}) 17:29:05 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, 0xffffffffffffffff) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000001c0)) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000000)) 17:29:05 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)) socket(0x0, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x0) 17:29:05 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000006100)) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000500)) 17:29:05 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000001c0)=""/172) 17:29:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)={'#! ', './file0/file0', [], 0xa}, 0x11) 17:29:05 executing program 5: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000100), 0x0) 17:29:05 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000140)) 17:29:05 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)) socket(0x0, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x0) 17:29:05 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000001c0)) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000000)) 17:29:05 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000006100)) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000500)) 17:29:05 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000200)={@remote={0xfe, 0x80, [], 0xbb}}) 17:29:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)={'#! ', './file0/file0', [], 0xa}, 0x11) 17:29:05 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000001c0)=""/172) 17:29:05 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000100), 0x0) 17:29:06 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000006100)) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000500)) 17:29:06 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000140)) 17:29:06 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000001c0)) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000000)) 17:29:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)={'#! ', './file0/file0', [], 0xa}, 0x11) 17:29:06 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000040), 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000001c0)=""/172) 17:29:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)) socket(0x0, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x0) 17:29:06 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000100), 0x0) 17:29:06 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000200)={@remote={0xfe, 0x80, [], 0xbb}}) 17:29:06 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000006100)) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000500)) 17:29:06 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000140)) 17:29:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)={'#! ', './file0/file0', [], 0xa}, 0x11) 17:29:06 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000001c0)) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000000)) 17:29:06 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000040), 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000001c0)=""/172) 17:29:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x0) 17:29:06 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000100), 0x0) 17:29:06 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000006100)) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000500)) 17:29:06 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000200)={@remote={0xfe, 0x80, [], 0xbb}}) 17:29:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)={'#! ', './file0/file0', [], 0xa}, 0x11) 17:29:06 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000040), 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000001c0)=""/172) 17:29:06 executing program 6: creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000140)) 17:29:06 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000001c0)) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000000)) 17:29:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x0) 17:29:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000100), 0x0) 17:29:06 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000006100)) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000500)) 17:29:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)={'#! ', './file0/file0', [], 0xa}, 0x11) 17:29:06 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000001c0)=""/172) 17:29:06 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000001c0)) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000000)) 17:29:06 executing program 6: creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000140)) 17:29:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000200)={@remote={0xfe, 0x80, [], 0xbb}}) [ 830.047905] audit: type=1326 audit(1529688547.046:1602): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20952 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x0) 17:29:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000100), 0x0) 17:29:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000780)={&(0x7f0000000600)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 17:29:07 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000001c0)) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000000)) 17:29:07 executing program 6: creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000140)) 17:29:07 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000001c0)=""/172) 17:29:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000100), 0x0) 17:29:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000200)={@remote={0xfe, 0x80, [], 0xbb}}) 17:29:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) socket(0x0, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x0) 17:29:07 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000140)) 17:29:07 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000001c0)=""/172) [ 830.573408] audit: type=1326 audit(1529688547.572:1603): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20995 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)={'#! ', './file0/file0', [], 0xa}, 0x11) 17:29:07 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 17:29:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000780)={&(0x7f0000000600)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 17:29:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000100), 0x0) 17:29:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000200)={@remote={0xfe, 0x80, [], 0xbb}}) 17:29:07 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000140)) 17:29:07 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000040), 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000001c0)=""/172) [ 830.977719] audit: type=1326 audit(1529688547.976:1604): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21011 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:08 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000140)) 17:29:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000100), 0x0) [ 831.048737] audit: type=1326 audit(1529688548.025:1605): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21022 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000200)={@remote={0xfe, 0x80, [], 0xbb}}) 17:29:08 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000780)={&(0x7f0000000600)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 17:29:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000140)) 17:29:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000100), 0x0) 17:29:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) socket(0x0, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x0) 17:29:08 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 17:29:08 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000780)={&(0x7f0000000600)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) [ 831.514892] audit: type=1326 audit(1529688548.513:1606): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21059 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)={'#! ', './file0/file0', [], 0xa}, 0x11) 17:29:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000100), 0x0) 17:29:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000140)) 17:29:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000200)={@remote={0xfe, 0x80, [], 0xbb}}) 17:29:08 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 17:29:08 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000780)={&(0x7f0000000600)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 17:29:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000040), 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000001c0)=""/172) [ 831.964905] audit: type=1326 audit(1529688548.963:1607): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21071 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000140)) [ 832.014136] audit: type=1326 audit(1529688549.001:1608): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21079 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 832.034333] audit: type=1326 audit(1529688549.002:1609): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21078 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:09 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 17:29:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000780)={&(0x7f0000000600)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 17:29:09 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000200)={@remote={0xfe, 0x80, [], 0xbb}}) 17:29:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000140)) 17:29:09 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) socket$inet_udplite(0x2, 0x2, 0x88) 17:29:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) socket(0x0, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x0) 17:29:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000780)={&(0x7f0000000600)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 17:29:09 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000200)={@remote={0xfe, 0x80, [], 0xbb}}) [ 832.484697] audit: type=1326 audit(1529688549.483:1610): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21108 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 832.524749] audit: type=1326 audit(1529688549.517:1611): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21114 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000040), 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000001c0)=""/172) 17:29:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000140)) 17:29:09 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) socket$inet_udplite(0x2, 0x2, 0x88) 17:29:09 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000780)={&(0x7f0000000600)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 17:29:09 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000100), 0x0) 17:29:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) readv(0xffffffffffffffff, &(0x7f00000002c0), 0x545) 17:29:10 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000780)={&(0x7f0000000600)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 17:29:10 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000140)) 17:29:10 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) socket$inet_udplite(0x2, 0x2, 0x88) 17:29:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) readv(0xffffffffffffffff, &(0x7f00000002c0), 0x545) 17:29:10 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000140)) 17:29:10 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000780)={&(0x7f0000000600)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 17:29:10 executing program 3: openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 17:29:10 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000200)={@remote={0xfe, 0x80, [], 0xbb}}) 17:29:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) readv(0xffffffffffffffff, &(0x7f00000002c0), 0x545) 17:29:10 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000780)={&(0x7f0000000600)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 17:29:10 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000100), 0x0) 17:29:10 executing program 3: openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 17:29:10 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) accept4(0xffffffffffffffff, 0x0, &(0x7f00000006c0), 0x0) readv(0xffffffffffffffff, &(0x7f0000000140), 0x0) 17:29:10 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000780)={&(0x7f0000000600)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 17:29:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) readv(0xffffffffffffffff, &(0x7f00000002c0), 0x545) 17:29:10 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, &(0x7f00000000c0)=""/14, 0xe, 0x0, 0x0, 0x0) 17:29:11 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000780)={&(0x7f0000000600)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 17:29:11 executing program 3: openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 17:29:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) readv(0xffffffffffffffff, &(0x7f00000002c0), 0x545) 17:29:11 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, &(0x7f00000000c0)=""/14, 0xe, 0x0, 0x0, 0x0) 17:29:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000140)) 17:29:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x4) 17:29:11 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000780)={&(0x7f0000000600)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 17:29:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000200)={@remote={0xfe, 0x80, [], 0xbb}}) 17:29:11 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 17:29:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) readv(0xffffffffffffffff, &(0x7f00000002c0), 0x545) 17:29:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) readv(0xffffffffffffffff, &(0x7f00000002c0), 0x545) 17:29:11 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, &(0x7f00000000c0)=""/14, 0xe, 0x0, 0x0, 0x0) 17:29:11 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000780)={&(0x7f0000000600)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 17:29:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x4) 17:29:11 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 17:29:11 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) 17:29:11 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000780)={&(0x7f0000000600)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 17:29:12 executing program 2: listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) readv(0xffffffffffffffff, &(0x7f00000002c0), 0x545) 17:29:12 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 17:29:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002080)={'ip6_vti0\x00'}) 17:29:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020d}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000780)={&(0x7f0000000600)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 17:29:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000140)) 17:29:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002080)={'ip6_vti0\x00'}) [ 835.297862] kauditd_printk_skb: 7 callbacks suppressed [ 835.297889] audit: type=1326 audit(1529688552.296:1619): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21265 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:12 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, &(0x7f00000000c0)=""/14, 0xe, 0x0, 0x0, 0x0) 17:29:12 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 17:29:12 executing program 2: listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) readv(0xffffffffffffffff, &(0x7f00000002c0), 0x545) 17:29:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x4) 17:29:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020d}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000780)={&(0x7f0000000600)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 17:29:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002080)={'ip6_vti0\x00'}) 17:29:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) 17:29:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020d}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000780)={&(0x7f0000000600)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 17:29:12 executing program 2: listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) readv(0xffffffffffffffff, &(0x7f00000002c0), 0x545) 17:29:12 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 17:29:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x4) 17:29:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002080)={'ip6_vti0\x00'}) 17:29:12 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) recvfrom$inet(0xffffffffffffffff, &(0x7f00000000c0)=""/14, 0xe, 0x0, 0x0, 0x0) 17:29:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) 17:29:13 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 17:29:13 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) readv(0xffffffffffffffff, &(0x7f00000002c0), 0x545) 17:29:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000780)={&(0x7f0000000600)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 17:29:13 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002080)={'ip6_vti0\x00'}) 17:29:13 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) 17:29:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x4) 17:29:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) recvfrom$inet(0xffffffffffffffff, &(0x7f00000000c0)=""/14, 0xe, 0x0, 0x0, 0x0) 17:29:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)=@srh={0x0, 0x0, 0x4}, 0x8) [ 836.254708] audit: type=1326 audit(1529688553.253:1620): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21317 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:13 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) readv(0xffffffffffffffff, &(0x7f00000002c0), 0x545) 17:29:13 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 17:29:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x4) 17:29:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) recvfrom$inet(0xffffffffffffffff, &(0x7f00000000c0)=""/14, 0xe, 0x0, 0x0, 0x0) 17:29:13 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) 17:29:13 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002080)={'ip6_vti0\x00'}) 17:29:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)=@srh={0x0, 0x0, 0x4}, 0x8) 17:29:13 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) readv(0xffffffffffffffff, &(0x7f00000002c0), 0x545) 17:29:13 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 17:29:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x4) 17:29:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000780)={&(0x7f0000000600)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 17:29:14 executing program 7: openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, &(0x7f00000000c0)=""/14, 0xe, 0x0, 0x0, 0x0) 17:29:14 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002080)={'ip6_vti0\x00'}) 17:29:14 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) 17:29:14 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 17:29:14 executing program 1: listxattr(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x4) 17:29:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) readv(0xffffffffffffffff, &(0x7f00000002c0), 0x545) 17:29:14 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)=@srh={0x0, 0x0, 0x4}, 0x8) [ 837.173126] audit: type=1326 audit(1529688554.171:1621): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21370 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:14 executing program 7: openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, &(0x7f00000000c0)=""/14, 0xe, 0x0, 0x0, 0x0) 17:29:14 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 17:29:14 executing program 1: listxattr(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x4) 17:29:14 executing program 5: openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002080)={'ip6_vti0\x00'}) 17:29:14 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) 17:29:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) readv(0xffffffffffffffff, &(0x7f00000002c0), 0x545) [ 837.420201] audit: type=1326 audit(1529688554.418:1622): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21391 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:14 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)=@srh={0x0, 0x0, 0x4}, 0x8) 17:29:14 executing program 7: openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, &(0x7f00000000c0)=""/14, 0xe, 0x0, 0x0, 0x0) 17:29:15 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000780)={&(0x7f0000000600)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 17:29:15 executing program 1: listxattr(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x4) 17:29:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) readv(0xffffffffffffffff, &(0x7f00000002c0), 0x545) 17:29:15 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) 17:29:15 executing program 5: openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002080)={'ip6_vti0\x00'}) 17:29:15 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, &(0x7f00000000c0)=""/14, 0xe, 0x0, 0x0, 0x0) 17:29:15 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)=@srh={0x0, 0x0, 0x4}, 0x8) [ 838.102738] audit: type=1326 audit(1529688555.101:1623): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21418 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) readv(0xffffffffffffffff, &(0x7f00000002c0), 0x545) 17:29:15 executing program 5: openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002080)={'ip6_vti0\x00'}) 17:29:15 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 17:29:15 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x4) 17:29:15 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)=@srh={0x0, 0x0, 0x4}, 0x8) 17:29:15 executing program 4: socket$inet6(0xa, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) 17:29:15 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, &(0x7f00000000c0)=""/14, 0xe, 0x0, 0x0, 0x0) 17:29:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) readv(0xffffffffffffffff, &(0x7f00000002c0), 0x545) [ 838.424913] audit: type=1326 audit(1529688555.423:1624): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21445 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:15 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, &(0x7f00000000c0)=""/14, 0xe, 0x0, 0x0, 0x0) 17:29:16 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, &(0x7f00000000c0)=""/14, 0xe, 0x0, 0x0, 0x0) 17:29:16 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002080)={'ip6_vti0\x00'}) 17:29:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)=@srh={0x0, 0x0, 0x4}, 0x8) 17:29:16 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x4) 17:29:16 executing program 4: socket$inet6(0xa, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) 17:29:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) readv(0xffffffffffffffff, &(0x7f00000002c0), 0x545) 17:29:16 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000100), 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x0) 17:29:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) readv(0xffffffffffffffff, &(0x7f00000002c0), 0x545) 17:29:16 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, &(0x7f00000000c0)=""/14, 0xe, 0x0, 0x0, 0x0) [ 839.214826] audit: type=1326 audit(1529688556.213:1625): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21488 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 17:29:16 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002080)={'ip6_vti0\x00'}) 17:29:16 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x4) 17:29:16 executing program 6: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)=@srh={0x0, 0x0, 0x4}, 0x8) 17:29:16 executing program 4: socket$inet6(0xa, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) 17:29:16 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000100), 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x0) 17:29:16 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, &(0x7f00000000c0)=""/14, 0xe, 0x0, 0x0, 0x0) [ 839.414482] audit: type=1326 audit(1529688556.413:1626): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21510 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:16 executing program 6: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)=@srh={0x0, 0x0, 0x4}, 0x8) 17:29:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) listxattr(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x4) 17:29:16 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002080)={'ip6_vti0\x00'}) 17:29:16 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000100), 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x0) 17:29:16 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, &(0x7f00000000c0)=""/14, 0xe, 0x0, 0x0, 0x0) 17:29:16 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) 17:29:16 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002080)={'ip6_vti0\x00'}) 17:29:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) readv(0xffffffffffffffff, &(0x7f00000002c0), 0x545) 17:29:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) listxattr(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x4) [ 840.101241] audit: type=1326 audit(1529688557.099:1627): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21549 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000100), 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x0) 17:29:17 executing program 6: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)=@srh={0x0, 0x0, 0x4}, 0x8) 17:29:17 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, &(0x7f00000000c0)=""/14, 0xe, 0x0, 0x0, 0x0) 17:29:17 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002080)={'ip6_vti0\x00'}) 17:29:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) listxattr(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x4) 17:29:17 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) 17:29:17 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) socket$key(0xf, 0x3, 0x2) delete_module(&(0x7f0000000000)='self()\x00', 0x0) 17:29:17 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002080)={'ip6_vti0\x00'}) 17:29:17 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)=@srh={0x0, 0x0, 0x4}, 0x8) 17:29:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x4) 17:29:17 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, &(0x7f00000000c0)=""/14, 0xe, 0x0, 0x0, 0x0) 17:29:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x0) 17:29:17 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) 17:29:17 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002080)={'ip6_vti0\x00'}) 17:29:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) readv(0xffffffffffffffff, &(0x7f00000002c0), 0x545) 17:29:18 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) socket$key(0xf, 0x3, 0x2) delete_module(&(0x7f0000000000)='self()\x00', 0x0) 17:29:18 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)=@srh={0x0, 0x0, 0x4}, 0x8) 17:29:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x4) 17:29:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, &(0x7f00000000c0)=""/14, 0xe, 0x0, 0x0, 0x0) 17:29:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002080)={'ip6_vti0\x00'}) 17:29:18 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x0) 17:29:18 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) [ 841.053108] audit: type=1326 audit(1529688558.051:1628): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21609 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002080)={'ip6_vti0\x00'}) [ 841.111578] audit: type=1326 audit(1529688558.080:1629): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21616 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:18 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)=@srh={0x0, 0x0, 0x4}, 0x8) 17:29:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x4) 17:29:18 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) 17:29:18 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x0) 17:29:18 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) socket$key(0xf, 0x3, 0x2) delete_module(&(0x7f0000000000)='self()\x00', 0x0) 17:29:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002080)={'ip6_vti0\x00'}) 17:29:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) listxattr(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x4) [ 841.417762] audit: type=1326 audit(1529688558.416:1630): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21640 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 841.503751] audit: type=1326 audit(1529688558.467:1631): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21645 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, &(0x7f00000000c0)=""/14, 0xe, 0x0, 0x0, 0x0) 17:29:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)=@srh={0x0, 0x0, 0x4}, 0x8) 17:29:18 executing program 0: pipe2(&(0x7f0000000100), 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x0) 17:29:18 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) 17:29:18 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) socket$key(0xf, 0x3, 0x2) delete_module(&(0x7f0000000000)='self()\x00', 0x0) 17:29:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000380)={'mangle\x00', 0x2, [{}, {}]}, 0x48) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000500)) [ 842.055172] audit: type=1326 audit(1529688559.053:1632): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21662 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:19 executing program 0: pipe2(&(0x7f0000000100), 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x0) 17:29:19 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)=@srh={0x0, 0x0, 0x4}, 0x8) 17:29:19 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000001700)=[{}, {}, {}, {}], 0x4) setsockopt$inet_tcp_buf(r0, 0x6, 0x16, &(0x7f00000003c0)="47ffd6de", 0x4) 17:29:19 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) 17:29:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000380)={'mangle\x00', 0x2, [{}, {}]}, 0x48) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000500)) 17:29:19 executing program 0: pipe2(&(0x7f0000000100), 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x0) 17:29:19 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)=@srh={0x0, 0x0, 0x4}, 0x8) 17:29:19 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002080)={'ip6_vti0\x00'}) 17:29:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) listxattr(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x4) 17:29:19 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) socket$unix(0x1, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0x0) [ 842.502470] audit: type=1326 audit(1529688559.501:1633): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21695 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 842.593893] audit: type=1326 audit(1529688559.575:1634): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21702 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:19 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, &(0x7f00000000c0)=""/14, 0xe, 0x0, 0x0, 0x0) 17:29:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000380)={'mangle\x00', 0x2, [{}, {}]}, 0x48) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000500)) 17:29:19 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000100), 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x0) 17:29:19 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) 17:29:19 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)=@srh={0x0, 0x0, 0x4}, 0x8) 17:29:19 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) socket$unix(0x1, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0x0) 17:29:20 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000100), 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x0) 17:29:20 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)=@srh={0x0, 0x0, 0x4}, 0x8) [ 843.005907] audit: type=1326 audit(1529688560.001:1635): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21712 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000380)={'mangle\x00', 0x2, [{}, {}]}, 0x48) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000500)) 17:29:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) socket$unix(0x1, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0x0) 17:29:20 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000100), 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x0) 17:29:20 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)=@srh={0x0, 0x0, 0x4}, 0x8) 17:29:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) 17:29:20 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002080)={'ip6_vti0\x00'}) 17:29:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) listxattr(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x4) 17:29:20 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)=@srh={0x0, 0x0, 0x4}, 0x8) [ 843.535922] audit: type=1326 audit(1529688560.534:1636): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21756 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 843.571674] audit: type=1326 audit(1529688560.556:1637): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21758 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) 17:29:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000500)) 17:29:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000100), 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x0) 17:29:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) socket$unix(0x1, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0x0) 17:29:20 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000140)=@kern={0x10}, 0xc, &(0x7f0000000500)}, 0x0) 17:29:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0x0) 17:29:21 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000100), 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x0) 17:29:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000500)) 17:29:21 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000140)=@kern={0x10}, 0xc, &(0x7f0000000500)}, 0x0) 17:29:21 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000100), 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x0) 17:29:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0x0) 17:29:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000500)) 17:29:21 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000100), 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x0) 17:29:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0x0) 17:29:21 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)=@srh={0x0, 0x0, 0x4}, 0x8) 17:29:21 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000140)=@kern={0x10}, 0xc, &(0x7f0000000500)}, 0x0) 17:29:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) 17:29:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050206}]}) nanosleep(&(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000100)={0x0, 0x0, 0x0, {0x77359400}}) 17:29:21 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000100), 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x0) 17:29:21 executing program 2: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000380)={'mangle\x00', 0x2, [{}, {}]}, 0x48) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000500)) 17:29:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) ioprio_set$uid(0x0, 0x0, 0x0) 17:29:21 executing program 3: socket$unix(0x1, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0x0) 17:29:21 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000140)=@kern={0x10}, 0xc, &(0x7f0000000500)}, 0x0) 17:29:21 executing program 3: socket$unix(0x1, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0x0) 17:29:21 executing program 2: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000380)={'mangle\x00', 0x2, [{}, {}]}, 0x48) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000500)) 17:29:22 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000100), 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x0) 17:29:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050206}]}) nanosleep(&(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000100)={0x0, 0x0, 0x0, {0x77359400}}) 17:29:22 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000140)=@kern={0x10}, 0xc, &(0x7f0000000500)}, 0x0) 17:29:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) ioprio_set$uid(0x0, 0x0, 0x0) 17:29:22 executing program 2: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000380)={'mangle\x00', 0x2, [{}, {}]}, 0x48) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000500)) 17:29:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)=@srh={0x0, 0x0, 0x4}, 0x8) 17:29:22 executing program 3: socket$unix(0x1, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0x0) 17:29:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050206}]}) nanosleep(&(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000100)={0x0, 0x0, 0x0, {0x77359400}}) 17:29:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) 17:29:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) ioprio_set$uid(0x0, 0x0, 0x0) 17:29:22 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000380)={'mangle\x00', 0x2, [{}, {}]}, 0x48) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000500)) 17:29:22 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000140)=@kern={0x10}, 0xc, &(0x7f0000000500)}, 0x0) 17:29:22 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) socket$unix(0x1, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0x0) 17:29:22 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000100), 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x0) 17:29:22 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000380)={'mangle\x00', 0x2, [{}, {}]}, 0x48) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000500)) 17:29:22 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) socket$unix(0x1, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0x0) 17:29:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) ioprio_set$uid(0x0, 0x0, 0x0) 17:29:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050206}]}) nanosleep(&(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000100)={0x0, 0x0, 0x0, {0x77359400}}) 17:29:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000140)=@kern={0x10}, 0xc, &(0x7f0000000500)}, 0x0) 17:29:23 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000380)={'mangle\x00', 0x2, [{}, {}]}, 0x48) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000500)) 17:29:23 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) socket$unix(0x1, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0x0) 17:29:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050206}]}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000100)={0x0, 0x0, 0x0, {0x77359400}}) 17:29:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) ioprio_set$uid(0x0, 0x0, 0x0) 17:29:23 executing program 7: openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000140)=@kern={0x10}, 0xc, &(0x7f0000000500)}, 0x0) 17:29:23 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000100), 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x0) 17:29:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000380)={'mangle\x00', 0x2, [{}, {}]}, 0x48) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000500)) 17:29:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) socket$unix(0x1, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0x0) 17:29:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) keyctl$get_security(0x11, 0x0, &(0x7f0000000140)=""/168, 0xa8) 17:29:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) ioprio_set$uid(0x0, 0x0, 0x0) 17:29:23 executing program 7: openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000140)=@kern={0x10}, 0xc, &(0x7f0000000500)}, 0x0) 17:29:23 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) lstat(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000200)) rt_sigpending(&(0x7f00000003c0), 0x8) 17:29:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050206}]}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000100)={0x0, 0x0, 0x0, {0x77359400}}) [ 846.845266] kauditd_printk_skb: 7 callbacks suppressed [ 846.845289] audit: type=1326 audit(1529688563.843:1645): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21933 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000380)={'mangle\x00', 0x2, [{}, {}]}, 0x48) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000500)) 17:29:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) socket$unix(0x1, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0x0) 17:29:23 executing program 7: openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000140)=@kern={0x10}, 0xc, &(0x7f0000000500)}, 0x0) 17:29:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050206}]}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000100)={0x0, 0x0, 0x0, {0x77359400}}) 17:29:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) ioprio_set$uid(0x0, 0x0, 0x0) 17:29:24 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) lstat(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000200)) rt_sigpending(&(0x7f00000003c0), 0x8) 17:29:24 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) keyctl$get_security(0x11, 0x0, &(0x7f0000000140)=""/168, 0xa8) 17:29:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000380)={'mangle\x00', 0x2, [{}, {}]}, 0x48) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000500)) 17:29:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000100), 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x0) 17:29:24 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000140)=@kern={0x10}, 0xc, &(0x7f0000000500)}, 0x0) 17:29:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) socket$unix(0x1, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0x0) 17:29:24 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) ioprio_set$uid(0x0, 0x0, 0x0) 17:29:24 executing program 5: nanosleep(&(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000100)={0x0, 0x0, 0x0, {0x77359400}}) 17:29:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000380)={'mangle\x00', 0x2, [{}, {}]}, 0x48) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000500)) 17:29:24 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) keyctl$get_security(0x11, 0x0, &(0x7f0000000140)=""/168, 0xa8) 17:29:24 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) accept$alg(r0, 0x0, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x0, &(0x7f00000001c0)={0x0, {{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}, {{0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x108) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000400)={'filter\x00', 0x7, 0x4, 0x430, 0x118, 0x118, 0x230, 0x348, 0x348, 0x348, 0x4, &(0x7f0000000100), {[{{@uncond, 0xf0, 0x118}, @unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}, {{@uncond, 0xf0, 0x118}, @unspec=@MARK={0x28, 'MARK\x00', 0x2}}, {{@uncond, 0xf0, 0x118}, @unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00'}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x480) 17:29:24 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000140)=@kern={0x10}, 0xc, &(0x7f0000000500)}, 0x0) [ 847.809878] audit: type=1326 audit(1529688564.807:1646): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21979 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000380)={'mangle\x00', 0x2, [{}, {}]}, 0x48) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000500)) 17:29:24 executing program 5: nanosleep(&(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000100)={0x0, 0x0, 0x0, {0x77359400}}) 17:29:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020d}]}) socket$unix(0x1, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0x0) 17:29:24 executing program 4: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, @in6=@dev={0xfe, 0x80}}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@local={0xfe, 0x80, [], 0xaa}}}, 0xe8) 17:29:24 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) ioprio_set$uid(0x0, 0x0, 0x0) 17:29:25 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000140)=@kern={0x10}, 0xc, &(0x7f0000000500)}, 0x0) 17:29:25 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) keyctl$get_security(0x11, 0x0, &(0x7f0000000140)=""/168, 0xa8) 17:29:25 executing program 5: nanosleep(&(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000100)={0x0, 0x0, 0x0, {0x77359400}}) 17:29:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000380)={'mangle\x00', 0x2, [{}, {}]}, 0x48) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000500)) 17:29:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020d}]}) socket$unix(0x1, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0x0) 17:29:25 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) keyctl$get_security(0x11, 0x0, &(0x7f0000000140)=""/168, 0xa8) 17:29:25 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) ioprio_set$uid(0x0, 0x0, 0x0) 17:29:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000000)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) mknod(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:29:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000140)=@kern={0x10}, 0xc, &(0x7f0000000500)}, 0x0) 17:29:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) close(0xffffffffffffffff) 17:29:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000380)={'mangle\x00', 0x2, [{}, {}]}, 0x48) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000500)) 17:29:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000140)=@kern={0x10}, 0xc, &(0x7f0000000500)}, 0x0) 17:29:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020d}]}) socket$unix(0x1, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0x0) 17:29:25 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) ioprio_set$uid(0x0, 0x0, 0x0) 17:29:25 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050206}]}) nanosleep(&(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000100)={0x0, 0x0, 0x0, {0x77359400}}) 17:29:25 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) keyctl$get_security(0x11, 0x0, &(0x7f0000000140)=""/168, 0xa8) 17:29:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000000)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) mknod(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) [ 848.922897] audit: type=1326 audit(1529688565.921:1647): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22047 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:26 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) close(0xffffffffffffffff) 17:29:26 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) ioprio_set$uid(0x0, 0x0, 0x0) 17:29:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$unix(0x1, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0x0) 17:29:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000140)=@kern={0x10}, 0xc, &(0x7f0000000500)}, 0x0) 17:29:26 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050206}]}) nanosleep(&(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000100)={0x0, 0x0, 0x0, {0x77359400}}) 17:29:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) keyctl$get_security(0x11, 0x0, &(0x7f0000000140)=""/168, 0xa8) [ 849.238795] audit: type=1326 audit(1529688566.237:1648): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22074 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000000)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) mknod(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:29:26 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50208}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000180)=0xc) creat(&(0x7f0000000040)='./file0\x00', 0x0) 17:29:26 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) ioprio_set$uid(0x0, 0x0, 0x0) 17:29:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000380)={'mangle\x00', 0x2, [{}, {}]}, 0x48) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000500)) 17:29:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000140)=@kern={0x10}, 0xc, &(0x7f0000000500)}, 0x0) 17:29:26 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050206}]}) nanosleep(&(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000100)={0x0, 0x0, 0x0, {0x77359400}}) 17:29:26 executing program 6: openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) keyctl$get_security(0x11, 0x0, &(0x7f0000000140)=""/168, 0xa8) 17:29:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000000)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) mknod(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:29:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socket$nl_netfilter(0x10, 0x3, 0xc) ioprio_set$uid(0x0, 0x0, 0x0) 17:29:26 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000280)=""/222) [ 849.846094] audit: type=1326 audit(1529688566.844:1649): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22102 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socket$nl_netfilter(0x10, 0x3, 0xc) ioprio_set$uid(0x0, 0x0, 0x0) 17:29:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000140)=@kern={0x10}, 0xc, &(0x7f0000000500)}, 0x0) 17:29:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$unix(0x1, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0x0) 17:29:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) nanosleep(&(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000100)={0x0, 0x0, 0x0, {0x77359400}}) 17:29:27 executing program 6: openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) keyctl$get_security(0x11, 0x0, &(0x7f0000000140)=""/168, 0xa8) 17:29:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) mknod(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:29:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000280)=""/222) 17:29:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000140)=@kern={0x10}, 0xc, &(0x7f0000000500)}, 0x0) 17:29:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socket$nl_netfilter(0x10, 0x3, 0xc) ioprio_set$uid(0x0, 0x0, 0x0) [ 850.243883] audit: type=1326 audit(1529688567.242:1650): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22143 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000380)={'mangle\x00', 0x2, [{}, {}]}, 0x48) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000500)) 17:29:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000140)=@kern={0x10}, 0xc, &(0x7f0000000500)}, 0x0) 17:29:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) nanosleep(&(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000100)={0x0, 0x0, 0x0, {0x77359400}}) 17:29:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) ioprio_set$uid(0x0, 0x0, 0x0) 17:29:27 executing program 6: openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) keyctl$get_security(0x11, 0x0, &(0x7f0000000140)=""/168, 0xa8) 17:29:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) mknod(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:29:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000240)) [ 850.763328] audit: type=1326 audit(1529688567.762:1651): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22152 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:27 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) keyctl$get_security(0x11, 0x0, &(0x7f0000000140)=""/168, 0xa8) 17:29:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) ioprio_set$uid(0x0, 0x0, 0x0) [ 850.857799] audit: type=1326 audit(1529688567.856:1652): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22165 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$unix(0x1, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0x0) 17:29:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) mknod(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:29:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) nanosleep(&(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000100)={0x0, 0x0, 0x0, {0x77359400}}) 17:29:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000240)) 17:29:28 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) keyctl$get_security(0x11, 0x0, &(0x7f0000000140)=""/168, 0xa8) 17:29:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) ioprio_set$uid(0x0, 0x0, 0x0) [ 851.206903] audit: type=1326 audit(1529688568.205:1653): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22182 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) socket$nl_netfilter(0x10, 0x3, 0xc) ioprio_set$uid(0x0, 0x0, 0x0) [ 851.306748] audit: type=1326 audit(1529688568.305:1654): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22193 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000140)=@kern={0x10}, 0xc, &(0x7f0000000500)}, 0x0) 17:29:28 executing program 4: memfd_create(&(0x7f0000000000)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) mknod(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:29:28 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) keyctl$get_security(0x11, 0x0, &(0x7f0000000140)=""/168, 0xa8) 17:29:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050206}]}) nanosleep(&(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000100)={0x0, 0x0, 0x0, {0x77359400}}) 17:29:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000240)) 17:29:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@newtclass={0x24, 0x28}, 0x24}, 0x1}, 0x0) 17:29:28 executing program 4: memfd_create(&(0x7f0000000000)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) mknod(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:29:28 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) keyctl$get_security(0x11, 0x0, &(0x7f0000000140)=""/168, 0xa8) 17:29:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050206}]}) nanosleep(&(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000100)={0x0, 0x0, 0x0, {0x77359400}}) 17:29:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050206}]}) nanosleep(&(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000100)={0x0, 0x0, 0x0, {0x77359400}}) 17:29:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000240)) 17:29:29 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@newtclass={0x24, 0x28}, 0x24}, 0x1}, 0x0) 17:29:29 executing program 4: memfd_create(&(0x7f0000000000)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) mknod(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:29:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) keyctl$get_security(0x11, 0x0, &(0x7f0000000140)=""/168, 0xa8) 17:29:29 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha256\x00'}, 0x58) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") accept4(r0, 0x0, &(0x7f00000001c0)=0x368, 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}}}, 0x84) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f00000017c0)=ANY=[], 0x0) 17:29:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) socket$nl_netfilter(0x10, 0x3, 0xc) ioprio_set$uid(0x0, 0x0, 0x0) [ 852.363720] kauditd_printk_skb: 1 callbacks suppressed [ 852.363742] audit: type=1326 audit(1529688569.362:1656): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22251 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000140)=@kern={0x10}, 0xc, &(0x7f0000000500)}, 0x0) 17:29:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) keyctl$get_security(0x11, 0x0, &(0x7f0000000140)=""/168, 0xa8) 17:29:29 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000000)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) mknod(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:29:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000240)) 17:29:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) nanosleep(&(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000100)={0x0, 0x0, 0x0, {0x77359400}}) 17:29:29 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@newtclass={0x24, 0x28}, 0x24}, 0x1}, 0x0) 17:29:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) geteuid() ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f00000001c0)) [ 852.756584] audit: type=1326 audit(1529688569.755:1657): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22259 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:29 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000000)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) mknod(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:29:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5020a}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) keyctl$get_security(0x11, 0x0, &(0x7f0000000140)=""/168, 0xa8) 17:29:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) geteuid() ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f00000001c0)) [ 852.810905] audit: type=1326 audit(1529688569.790:1658): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22267 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000240)) 17:29:29 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@newtclass={0x24, 0x28}, 0x24}, 0x1}, 0x0) 17:29:30 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000000)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) mknod(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:29:30 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5020a}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) keyctl$get_security(0x11, 0x0, &(0x7f0000000140)=""/168, 0xa8) 17:29:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) geteuid() ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f00000001c0)) 17:29:30 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) socket$nl_netfilter(0x10, 0x3, 0xc) ioprio_set$uid(0x0, 0x0, 0x0) [ 853.309683] audit: type=1326 audit(1529688570.308:1659): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22302 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) nanosleep(&(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000100)={0x0, 0x0, 0x0, {0x77359400}}) 17:29:30 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000240)) 17:29:30 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@newtclass={0x24, 0x28}, 0x24}, 0x1}, 0x0) 17:29:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) memfd_create(&(0x7f0000000000)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) mknod(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:29:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000100)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) keyctl$invalidate(0x15, 0x0) 17:29:30 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5020a}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) keyctl$get_security(0x11, 0x0, &(0x7f0000000140)=""/168, 0xa8) 17:29:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) geteuid() ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f00000001c0)) [ 853.724145] audit: type=1326 audit(1529688570.722:1660): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22314 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:30 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) keyctl$get_security(0x11, 0x0, &(0x7f0000000140)=""/168, 0xa8) 17:29:30 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@newtclass={0x24, 0x28}, 0x24}, 0x1}, 0x0) 17:29:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) memfd_create(&(0x7f0000000000)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) mknod(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:29:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f00000001c0)) 17:29:30 executing program 0: pipe(&(0x7f0000000080)) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000240)) [ 853.909126] audit: type=1326 audit(1529688570.907:1661): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22326 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@newtclass={0x24, 0x28}, 0x24}, 0x1}, 0x0) 17:29:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000100)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) keyctl$invalidate(0x15, 0x0) 17:29:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) memfd_create(&(0x7f0000000000)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) mknod(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:29:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f00000001c0)) 17:29:31 executing program 2: pipe(&(0x7f0000000080)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@newtclass={0x24, 0x28}, 0x24}, 0x1}, 0x0) 17:29:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) nanosleep(&(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000100)={0x0, 0x0, 0x0, {0x77359400}}) 17:29:31 executing program 0: pipe(&(0x7f0000000080)) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000240)) 17:29:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @local}, @in6=@dev}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) 17:29:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000000)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) mknod(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:29:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000100)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) keyctl$invalidate(0x15, 0x0) 17:29:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f00000001c0)) [ 854.694025] audit: type=1326 audit(1529688571.692:1662): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22370 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:31 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) keyctl$get_security(0x11, 0x0, &(0x7f0000000140)=""/168, 0xa8) 17:29:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000000)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) mknod(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:29:31 executing program 2: pipe(&(0x7f0000000080)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@newtclass={0x24, 0x28}, 0x24}, 0x1}, 0x0) 17:29:31 executing program 3: geteuid() ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f00000001c0)) 17:29:31 executing program 0: pipe(&(0x7f0000000080)) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000240)) 17:29:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000100)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) keyctl$invalidate(0x15, 0x0) 17:29:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @local}, @in6=@dev}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) [ 854.947785] audit: type=1326 audit(1529688571.946:1663): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22391 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:32 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000240)) 17:29:32 executing program 3: geteuid() ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f00000001c0)) 17:29:32 executing program 2: pipe(&(0x7f0000000080)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@newtclass={0x24, 0x28}, 0x24}, 0x1}, 0x0) 17:29:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @local}, @in6=@dev}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) 17:29:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000000)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) mknod(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:29:32 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) keyctl$invalidate(0x15, 0x0) 17:29:32 executing program 3: geteuid() ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f00000001c0)) 17:29:32 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000240)) 17:29:32 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@newtclass={0x24, 0x28}, 0x24}, 0x1}, 0x0) 17:29:32 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) keyctl$get_security(0x11, 0x0, &(0x7f0000000140)=""/168, 0xa8) 17:29:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000d}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:29:32 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@newtclass={0x24, 0x28}, 0x24}, 0x1}, 0x0) 17:29:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) memfd_create(&(0x7f0000000000)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) mknod(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:29:32 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) geteuid() ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f00000001c0)) 17:29:32 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000240)) 17:29:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @local}, @in6=@dev}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) 17:29:32 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) keyctl$invalidate(0x15, 0x0) [ 855.898755] audit: type=1326 audit(1529688572.897:1664): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22439 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:32 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) pipe(&(0x7f0000000080)) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000240)) 17:29:32 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) geteuid() ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f00000001c0)) 17:29:33 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@newtclass={0x24, 0x28}, 0x24}, 0x1}, 0x0) [ 855.989460] audit: type=1326 audit(1529688572.921:1665): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22443 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:33 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) keyctl$invalidate(0x15, 0x0) 17:29:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @local}, @in6=@dev}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) 17:29:33 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000d}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:29:33 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) pipe(&(0x7f0000000080)) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000240)) 17:29:33 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) geteuid() ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f00000001c0)) 17:29:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) memfd_create(&(0x7f0000000000)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) mknod(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:29:33 executing program 7: memfd_create(&(0x7f0000000100)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) keyctl$invalidate(0x15, 0x0) 17:29:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) pipe(&(0x7f0000000080)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@newtclass={0x24, 0x28}, 0x24}, 0x1}, 0x0) 17:29:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @local}, @in6=@dev}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) 17:29:33 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000d}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:29:33 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) pipe(&(0x7f0000000080)) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000240)) 17:29:33 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) geteuid() ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f00000001c0)) 17:29:33 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000000)=0x24) 17:29:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) pipe(&(0x7f0000000080)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@newtclass={0x24, 0x28}, 0x24}, 0x1}, 0x0) 17:29:33 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000240)) 17:29:33 executing program 7: memfd_create(&(0x7f0000000100)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) keyctl$invalidate(0x15, 0x0) 17:29:33 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) geteuid() ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f00000001c0)) 17:29:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @local}, @in6=@dev}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) 17:29:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000d}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:29:34 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) pipe(&(0x7f0000000080)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@newtclass={0x24, 0x28}, 0x24}, 0x1}, 0x0) 17:29:34 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000000)=0x24) 17:29:34 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) memfd_create(&(0x7f0000000000)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) mknod(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:29:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000240)) 17:29:34 executing program 7: memfd_create(&(0x7f0000000100)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) keyctl$invalidate(0x15, 0x0) 17:29:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) geteuid() ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f00000001c0)) 17:29:34 executing program 1: pipe2(&(0x7f0000000040), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @local}, @in6=@dev}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) 17:29:34 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@newtclass={0x24, 0x28}, 0x24}, 0x1}, 0x0) 17:29:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000d}]}) mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:29:34 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000000)=0x24) [ 857.839618] kauditd_printk_skb: 1 callbacks suppressed [ 857.839643] audit: type=1326 audit(1529688574.837:1667): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22549 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) geteuid() ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f00000001c0)) 17:29:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000240)) 17:29:34 executing program 1: pipe2(&(0x7f0000000040), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @local}, @in6=@dev}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) 17:29:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000d}]}) mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:29:34 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@newtclass={0x24, 0x28}, 0x24}, 0x1}, 0x0) 17:29:34 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000100)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) keyctl$invalidate(0x15, 0x0) 17:29:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000000)=0x24) 17:29:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) pipe(&(0x7f0000000080)) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000240)) [ 858.220329] audit: type=1326 audit(1529688575.219:1668): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22574 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@newtclass={0x24, 0x28}, 0x24}, 0x1}, 0x0) 17:29:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) geteuid() ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f00000001c0)) 17:29:35 executing program 1: pipe2(&(0x7f0000000040), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @local}, @in6=@dev}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) 17:29:35 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000100)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) keyctl$invalidate(0x15, 0x0) 17:29:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000000)=0x24) 17:29:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000d}]}) mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:29:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) accept(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000000)=0x80) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'security\x00'}, &(0x7f0000000280)=0x24) 17:29:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) pipe(&(0x7f0000000080)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@newtclass={0x24, 0x28}, 0x24}, 0x1}, 0x0) 17:29:35 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000100)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) keyctl$invalidate(0x15, 0x0) 17:29:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) geteuid() ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f00000001c0)) 17:29:35 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @local}, @in6=@dev}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) 17:29:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000000)=0x24) 17:29:35 executing program 5: socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:29:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000100)='cifs.spnego\x00', &(0x7f0000000180)='/proc/sys/net/ipv4/vs/snat_reroute\x00') [ 859.017323] audit: type=1326 audit(1529688576.016:1669): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22603 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) memfd_create(&(0x7f0000000100)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) keyctl$invalidate(0x15, 0x0) 17:29:36 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @local}, @in6=@dev}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) 17:29:36 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) pipe(&(0x7f0000000080)) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000240)) 17:29:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) geteuid() ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f00000001c0)) 17:29:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000000)=0x24) 17:29:36 executing program 5: socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 859.229689] audit: type=1326 audit(1529688576.228:1670): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22623 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) memfd_create(&(0x7f0000000100)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) keyctl$invalidate(0x15, 0x0) 17:29:36 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @local}, @in6=@dev}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) [ 859.349831] audit: type=1326 audit(1529688576.286:1671): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22629 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000100)='cifs.spnego\x00', &(0x7f0000000180)='/proc/sys/net/ipv4/vs/snat_reroute\x00') 17:29:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) pipe(&(0x7f0000000080)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@newtclass={0x24, 0x28}, 0x24}, 0x1}, 0x0) 17:29:36 executing program 6: pipe(&(0x7f0000000080)) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000000)=0x24) 17:29:36 executing program 5: socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:29:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000040), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @local}, @in6=@dev}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) 17:29:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) memfd_create(&(0x7f0000000100)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) keyctl$invalidate(0x15, 0x0) 17:29:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000100)='cifs.spnego\x00', &(0x7f0000000180)='/proc/sys/net/ipv4/vs/snat_reroute\x00') [ 859.930468] audit: type=1326 audit(1529688576.929:1672): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22658 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:37 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000040), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @local}, @in6=@dev}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) 17:29:37 executing program 6: pipe(&(0x7f0000000080)) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000000)=0x24) 17:29:37 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000100)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) keyctl$invalidate(0x15, 0x0) 17:29:37 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) pipe(&(0x7f0000000080)) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000240)) 17:29:37 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) geteuid() ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f00000001c0)) 17:29:37 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000d}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:29:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000100)='cifs.spnego\x00', &(0x7f0000000180)='/proc/sys/net/ipv4/vs/snat_reroute\x00') 17:29:37 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000100)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) keyctl$invalidate(0x15, 0x0) 17:29:37 executing program 6: pipe(&(0x7f0000000080)) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000000)=0x24) 17:29:37 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000040), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @local}, @in6=@dev}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) [ 860.265831] audit: type=1326 audit(1529688577.264:1673): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22685 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 860.368825] audit: type=1326 audit(1529688577.340:1674): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22701 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:37 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000d}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:29:37 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @local}, @in6=@dev}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) 17:29:37 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000100)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) keyctl$invalidate(0x15, 0x0) 17:29:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) pipe(&(0x7f0000000080)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@newtclass={0x24, 0x28}, 0x24}, 0x1}, 0x0) 17:29:37 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000000)=0x24) 17:29:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000100)='cifs.spnego\x00', &(0x7f0000000180)='/proc/sys/net/ipv4/vs/snat_reroute\x00') 17:29:37 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000000)=0x24) [ 860.901563] audit: type=1326 audit(1529688577.900:1675): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22721 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:37 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) memfd_create(&(0x7f0000000100)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) keyctl$invalidate(0x15, 0x0) 17:29:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @local}, @in6=@dev}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) [ 861.035962] audit: type=1326 audit(1529688578.034:1676): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22727 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @local}, @in6=@dev}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) 17:29:38 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000100)='cifs.spnego\x00', &(0x7f0000000180)='/proc/sys/net/ipv4/vs/snat_reroute\x00') 17:29:38 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000000)=0x24) 17:29:38 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000d}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:29:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 17:29:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) geteuid() ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f00000001c0)) 17:29:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000040), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @local}, @in6=@dev}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) 17:29:38 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000100)='cifs.spnego\x00', &(0x7f0000000180)='/proc/sys/net/ipv4/vs/snat_reroute\x00') 17:29:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:29:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) pipe(&(0x7f0000000080)) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000000)=0x24) 17:29:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 17:29:38 executing program 4: add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000100)='cifs.spnego\x00', &(0x7f0000000180)='/proc/sys/net/ipv4/vs/snat_reroute\x00') 17:29:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) getpgrp(0x0) 17:29:38 executing program 4: add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000100)='cifs.spnego\x00', &(0x7f0000000180)='/proc/sys/net/ipv4/vs/snat_reroute\x00') 17:29:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) memfd_create(&(0x7f0000000100)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) keyctl$invalidate(0x15, 0x0) 17:29:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) pipe(&(0x7f0000000080)) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000000)=0x24) 17:29:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:29:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 17:29:39 executing program 4: add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000100)='cifs.spnego\x00', &(0x7f0000000180)='/proc/sys/net/ipv4/vs/snat_reroute\x00') 17:29:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000040), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @local}, @in6=@dev}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) 17:29:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000280)={0x0, 0x0, 0x0, @thr={&(0x7f0000000140), &(0x7f00000001c0)}}, &(0x7f00000002c0)) 17:29:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) pipe(&(0x7f0000000080)) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000000)=0x24) 17:29:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) accept(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000000)=0x80) fchownat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0) 17:29:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:29:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 17:29:39 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000100)='cifs.spnego\x00', &(0x7f0000000180)='/proc/sys/net/ipv4/vs/snat_reroute\x00') 17:29:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000000)=0x24) 17:29:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000280)={0x0, 0x0, 0x0, @thr={&(0x7f0000000140), &(0x7f00000001c0)}}, &(0x7f00000002c0)) 17:29:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x5000d}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:29:39 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000100)='cifs.spnego\x00', &(0x7f0000000180)='/proc/sys/net/ipv4/vs/snat_reroute\x00') 17:29:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000000)=0x24) 17:29:39 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000100)='cifs.spnego\x00', &(0x7f0000000180)='/proc/sys/net/ipv4/vs/snat_reroute\x00') 17:29:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) accept(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000000)=0x80) fchownat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0) 17:29:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000280)={0x0, 0x0, 0x0, @thr={&(0x7f0000000140), &(0x7f00000001c0)}}, &(0x7f00000002c0)) 17:29:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) memfd_create(&(0x7f0000000100)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) keyctl$invalidate(0x15, 0x0) [ 863.036748] kauditd_printk_skb: 4 callbacks suppressed [ 863.036771] audit: type=1326 audit(1529688580.035:1681): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22853 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000040), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @local}, @in6=@dev}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) 17:29:40 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 17:29:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x5000d}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:29:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000000)=0x24) 17:29:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x80005020a}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 17:29:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000100)='cifs.spnego\x00', &(0x7f0000000180)='/proc/sys/net/ipv4/vs/snat_reroute\x00') 17:29:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) accept(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000000)=0x80) fchownat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0) [ 863.294316] audit: type=1326 audit(1529688580.292:1682): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22869 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:40 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 17:29:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x5000d}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:29:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000100)='cifs.spnego\x00', &(0x7f0000000180)='/proc/sys/net/ipv4/vs/snat_reroute\x00') 17:29:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) pipe(&(0x7f0000000080)) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000000)=0x24) 17:29:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) accept(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000000)=0x80) fchownat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0) [ 863.493225] audit: type=1326 audit(1529688580.491:1683): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22884 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:29:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x80005020a}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 17:29:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000100)='cifs.spnego\x00', &(0x7f0000000180)='/proc/sys/net/ipv4/vs/snat_reroute\x00') 17:29:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) fchownat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0) [ 863.978626] audit: type=1326 audit(1529688580.977:1684): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22901 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x80005020a}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 17:29:41 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 17:29:41 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) 17:29:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020d}]}) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000100)='cifs.spnego\x00', &(0x7f0000000180)='/proc/sys/net/ipv4/vs/snat_reroute\x00') 17:29:41 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) fchownat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0) 17:29:41 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) 17:29:41 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) fchownat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0) 17:29:41 executing program 0: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 17:29:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020d}]}) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000100)='cifs.spnego\x00', &(0x7f0000000180)='/proc/sys/net/ipv4/vs/snat_reroute\x00') 17:29:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x80005020a}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 17:29:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) pipe(&(0x7f0000000080)) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000000)=0x24) 17:29:41 executing program 0: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) [ 864.524109] audit: type=1326 audit(1529688581.522:1685): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22941 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:41 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in=@local={0xac, 0x14, 0x14, 0xaa}, @in6=@ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}}, {{@in=@broadcast=0xffffffff}, 0x0, @in6=@dev={0xfe, 0x80}}}, 0xe8) 17:29:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:29:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020d}]}) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000100)='cifs.spnego\x00', &(0x7f0000000180)='/proc/sys/net/ipv4/vs/snat_reroute\x00') 17:29:41 executing program 7: ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000005e00)) 17:29:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x80005020a}]}) socket$nl_netfilter(0x10, 0x3, 0xc) 17:29:41 executing program 3: accept(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000000)=0x80) fchownat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0) 17:29:41 executing program 0: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 17:29:42 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000040)=[{0x400000000000006, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000240)=""/4096) [ 864.966306] audit: type=1326 audit(1529688581.965:1686): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22966 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:42 executing program 3: accept(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000000)=0x80) fchownat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0) 17:29:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000100)='cifs.spnego\x00', &(0x7f0000000180)='/proc/sys/net/ipv4/vs/snat_reroute\x00') 17:29:42 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 17:29:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x80005020a}]}) socket$nl_netfilter(0x10, 0x3, 0xc) [ 865.127288] audit: type=1326 audit(1529688582.126:1687): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22975 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:42 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in=@local={0xac, 0x14, 0x14, 0xaa}, @in6=@ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}}, {{@in=@broadcast=0xffffffff}, 0x0, @in6=@dev={0xfe, 0x80}}}, 0xe8) 17:29:42 executing program 3: accept(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000000)=0x80) fchownat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0) 17:29:42 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 17:29:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) pipe(&(0x7f0000000080)) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000000)=0x24) 17:29:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x80005020a}]}) socket$nl_netfilter(0x10, 0x3, 0xc) [ 865.468109] audit: type=1326 audit(1529688582.466:1688): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22998 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:42 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) accept(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000000)=0x80) fchownat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0) 17:29:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:29:42 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) socket$inet(0x2, 0x0, 0x0) 17:29:42 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in=@local={0xac, 0x14, 0x14, 0xaa}, @in6=@ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}}, {{@in=@broadcast=0xffffffff}, 0x0, @in6=@dev={0xfe, 0x80}}}, 0xe8) 17:29:42 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 17:29:42 executing program 2: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 17:29:42 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) accept(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000000)=0x80) fchownat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0) [ 865.930228] audit: type=1326 audit(1529688582.928:1689): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23018 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 17:29:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000100)='cifs.spnego\x00', &(0x7f0000000180)='/proc/sys/net/ipv4/vs/snat_reroute\x00') 17:29:43 executing program 2: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 17:29:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in=@local={0xac, 0x14, 0x14, 0xaa}, @in6=@ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}}, {{@in=@broadcast=0xffffffff}, 0x0, @in6=@dev={0xfe, 0x80}}}, 0xe8) 17:29:43 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) accept(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000000)=0x80) fchownat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0) [ 866.171911] audit: type=1326 audit(1529688583.170:1690): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23033 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 17:29:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) socket$inet(0x2, 0x0, 0x0) 17:29:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 17:29:43 executing program 2: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 17:29:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) accept(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000000)=0x80) fchownat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0) 17:29:43 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x80005020a}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 17:29:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in=@local={0xac, 0x14, 0x14, 0xaa}, @in6=@ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}}, {{@in=@broadcast=0xffffffff}, 0x0, @in6=@dev={0xfe, 0x80}}}, 0xe8) 17:29:43 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) vmsplice(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0) 17:29:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) 17:29:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) accept(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000000)=0x80) fchownat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0) 17:29:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 17:29:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) socket$inet(0x2, 0x0, 0x0) 17:29:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000100)='cifs.spnego\x00', &(0x7f0000000180)='/proc/sys/net/ipv4/vs/snat_reroute\x00') 17:29:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) accept(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000000)=0x80) fchownat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0) 17:29:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 17:29:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in=@local={0xac, 0x14, 0x14, 0xaa}, @in6=@ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}}, {{@in=@broadcast=0xffffffff}, 0x0, @in6=@dev={0xfe, 0x80}}}, 0xe8) 17:29:44 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x80005020a}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 17:29:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) socket$inet(0x2, 0x0, 0x0) 17:29:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) vmsplice(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0) 17:29:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) 17:29:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) accept(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000000)=0x80) fchownat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0) 17:29:44 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x80005020a}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 17:29:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 17:29:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in=@local={0xac, 0x14, 0x14, 0xaa}, @in6=@ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}}, {{@in=@broadcast=0xffffffff}, 0x0, @in6=@dev={0xfe, 0x80}}}, 0xe8) 17:29:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) socket$inet(0x2, 0x0, 0x0) 17:29:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) vmsplice(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0) 17:29:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) 17:29:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000004fe8)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 17:29:45 executing program 1: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in=@local={0xac, 0x14, 0x14, 0xaa}, @in6=@ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}}, {{@in=@broadcast=0xffffffff}, 0x0, @in6=@dev={0xfe, 0x80}}}, 0xe8) 17:29:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) accept(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000000)=0x80) fchownat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0) 17:29:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 17:29:45 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000004fe8)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 17:29:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) vmsplice(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0) 17:29:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) socket$inet(0x2, 0x0, 0x0) 17:29:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) 17:29:45 executing program 4: [ 868.123956] kauditd_printk_skb: 1 callbacks suppressed [ 868.129641] audit: type=1326 audit(1529688585.121:1692): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23138 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:45 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000004fe8)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 17:29:45 executing program 1: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in=@local={0xac, 0x14, 0x14, 0xaa}, @in6=@ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}}, {{@in=@broadcast=0xffffffff}, 0x0, @in6=@dev={0xfe, 0x80}}}, 0xe8) 17:29:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) accept(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000000)=0x80) fchownat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0) 17:29:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) socket$inet(0x2, 0x0, 0x0) 17:29:45 executing program 4: 17:29:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) 17:29:45 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x80005020a}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 17:29:45 executing program 4: 17:29:45 executing program 1: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in=@local={0xac, 0x14, 0x14, 0xaa}, @in6=@ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}}, {{@in=@broadcast=0xffffffff}, 0x0, @in6=@dev={0xfe, 0x80}}}, 0xe8) 17:29:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) vmsplice(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0) 17:29:46 executing program 4: 17:29:46 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 17:29:46 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) accept(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000000)=0x80) fchownat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0) 17:29:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) 17:29:46 executing program 7: listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) socket$inet(0x2, 0x0, 0x0) 17:29:46 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x80005020a}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 17:29:46 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in=@local={0xac, 0x14, 0x14, 0xaa}, @in6=@ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}}, {{@in=@broadcast=0xffffffff}, 0x0, @in6=@dev={0xfe, 0x80}}}, 0xe8) 17:29:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) vmsplice(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0) [ 869.072247] audit: type=1326 audit(1529688586.071:1693): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23192 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:46 executing program 4: 17:29:46 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in=@local={0xac, 0x14, 0x14, 0xaa}, @in6=@ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}}, {{@in=@broadcast=0xffffffff}, 0x0, @in6=@dev={0xfe, 0x80}}}, 0xe8) [ 869.140442] audit: type=1326 audit(1529688586.133:1694): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23205 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) 17:29:46 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x80005020a}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 17:29:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) vmsplice(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0) 17:29:46 executing program 7: listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) socket$inet(0x2, 0x0, 0x0) 17:29:46 executing program 4: 17:29:46 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in=@local={0xac, 0x14, 0x14, 0xaa}, @in6=@ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}}, {{@in=@broadcast=0xffffffff}, 0x0, @in6=@dev={0xfe, 0x80}}}, 0xe8) 17:29:46 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) 17:29:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 17:29:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000004fe8)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 17:29:47 executing program 4: 17:29:47 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) vmsplice(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0) 17:29:47 executing program 7: listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) socket$inet(0x2, 0x0, 0x0) 17:29:47 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in=@local={0xac, 0x14, 0x14, 0xaa}, @in6=@ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}}, {{@in=@broadcast=0xffffffff}, 0x0, @in6=@dev={0xfe, 0x80}}}, 0xe8) 17:29:47 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) 17:29:47 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) accept(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000000)=0x80) fchownat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0) [ 870.068783] audit: type=1326 audit(1529688587.067:1695): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23245 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:47 executing program 4: 17:29:47 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) 17:29:47 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in=@local={0xac, 0x14, 0x14, 0xaa}, @in6=@ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}}, {{@in=@broadcast=0xffffffff}, 0x0, @in6=@dev={0xfe, 0x80}}}, 0xe8) [ 870.151184] audit: type=1326 audit(1529688587.098:1696): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23254 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 870.171162] audit: type=1326 audit(1529688587.099:1697): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23248 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:47 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) vmsplice(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0) 17:29:47 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) socket$inet(0x2, 0x0, 0x0) 17:29:47 executing program 4: 17:29:47 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) 17:29:47 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in=@local={0xac, 0x14, 0x14, 0xaa}, @in6=@ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}}, {{@in=@broadcast=0xffffffff}, 0x0, @in6=@dev={0xfe, 0x80}}}, 0xe8) 17:29:48 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) 17:29:48 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) vmsplice(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0) 17:29:48 executing program 4: 17:29:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in=@local={0xac, 0x14, 0x14, 0xaa}, @in6=@ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}}, {{@in=@broadcast=0xffffffff}, 0x0, @in6=@dev={0xfe, 0x80}}}, 0xe8) 17:29:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000004fe8)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 17:29:48 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) socket$inet(0x2, 0x0, 0x0) 17:29:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) accept(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000000)=0x80) fchownat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0) 17:29:48 executing program 0: [ 871.053423] audit: type=1326 audit(1529688588.051:1698): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23296 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:48 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) vmsplice(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0) [ 871.130234] audit: type=1326 audit(1529688588.108:1699): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23302 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:48 executing program 4: 17:29:48 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) 17:29:48 executing program 0: 17:29:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in=@local={0xac, 0x14, 0x14, 0xaa}, @in6=@ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}}, {{@in=@broadcast=0xffffffff}, 0x0, @in6=@dev={0xfe, 0x80}}}, 0xe8) 17:29:48 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) socket$inet(0x2, 0x0, 0x0) 17:29:48 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) vmsplice(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0) 17:29:48 executing program 0: 17:29:48 executing program 4: 17:29:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in=@local={0xac, 0x14, 0x14, 0xaa}, @in6=@ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}}, {{@in=@broadcast=0xffffffff}, 0x0, @in6=@dev={0xfe, 0x80}}}, 0xe8) 17:29:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) 17:29:48 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) socket$inet(0x2, 0x0, 0x0) 17:29:48 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) vmsplice(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0) 17:29:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000004fe8)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 17:29:48 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) socket$inet(0x2, 0x0, 0x0) 17:29:48 executing program 0: 17:29:48 executing program 4: 17:29:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in=@local={0xac, 0x14, 0x14, 0xaa}, @in6=@ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}}, {{@in=@broadcast=0xffffffff}, 0x0, @in6=@dev={0xfe, 0x80}}}, 0xe8) 17:29:48 executing program 3: 17:29:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) 17:29:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) vmsplice(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0) [ 871.974854] audit: type=1326 audit(1529688588.973:1700): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23360 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:49 executing program 0: [ 872.083108] audit: type=1326 audit(1529688589.043:1701): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23367 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:49 executing program 4: 17:29:49 executing program 3: 17:29:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) 17:29:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) vmsplice(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0) 17:29:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) socket$inet(0x2, 0x0, 0x0) 17:29:49 executing program 0: 17:29:49 executing program 4: 17:29:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) socket$inet(0x2, 0x0, 0x0) 17:29:49 executing program 3: 17:29:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) vmsplice(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0) 17:29:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5020a}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) 17:29:50 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in=@local={0xac, 0x14, 0x14, 0xaa}, @in6=@ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}}, {{@in=@broadcast=0xffffffff}, 0x0, @in6=@dev={0xfe, 0x80}}}, 0xe8) 17:29:50 executing program 4: 17:29:50 executing program 0: 17:29:50 executing program 2: 17:29:50 executing program 3: 17:29:50 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) vmsplice(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0) 17:29:50 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) socket$inet(0x2, 0x0, 0x0) 17:29:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5020a}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) 17:29:50 executing program 3: 17:29:50 executing program 4: 17:29:50 executing program 2: 17:29:50 executing program 0: [ 873.142186] audit: type=1326 audit(1529688590.140:1702): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23427 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:50 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) vmsplice(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0) 17:29:50 executing program 4: 17:29:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5020a}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) 17:29:50 executing program 3: 17:29:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in=@local={0xac, 0x14, 0x14, 0xaa}, @in6=@ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}}, {{@in=@broadcast=0xffffffff}, 0x0, @in6=@dev={0xfe, 0x80}}}, 0xe8) 17:29:51 executing program 2: 17:29:51 executing program 0: 17:29:51 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) socket$inet(0x2, 0x0, 0x0) 17:29:51 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) vmsplice(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0) 17:29:51 executing program 3: 17:29:51 executing program 4: 17:29:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) [ 874.045514] audit: type=1326 audit(1529688591.044:1703): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23462 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:51 executing program 3: 17:29:51 executing program 4: [ 874.103017] audit: type=1326 audit(1529688591.081:1704): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23467 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:51 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) vmsplice(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0) 17:29:51 executing program 0: 17:29:51 executing program 2: 17:29:51 executing program 3: 17:29:51 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) socket$inet(0x2, 0x0, 0x0) [ 874.281409] audit: type=1326 audit(1529688591.279:1705): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23482 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:51 executing program 4: [ 874.406022] audit: type=1326 audit(1529688591.404:1706): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23490 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:51 executing program 4: 17:29:51 executing program 0: 17:29:51 executing program 2: 17:29:51 executing program 3: 17:29:51 executing program 1: 17:29:52 executing program 0: 17:29:52 executing program 4: 17:29:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) 17:29:52 executing program 3: 17:29:52 executing program 2: [ 875.203681] audit: type=1326 audit(1529688592.202:1707): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23515 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:52 executing program 0: 17:29:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) vmsplice(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0) 17:29:52 executing program 1: 17:29:52 executing program 3: 17:29:52 executing program 4: 17:29:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) socket$inet(0x2, 0x0, 0x0) 17:29:52 executing program 2: 17:29:52 executing program 1: [ 875.365772] audit: type=1326 audit(1529688592.364:1708): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23524 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:52 executing program 0: 17:29:52 executing program 3: 17:29:52 executing program 4: 17:29:52 executing program 2: 17:29:52 executing program 1: [ 875.521851] audit: type=1326 audit(1529688592.517:1709): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23537 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:53 executing program 3: 17:29:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) 17:29:53 executing program 0: 17:29:53 executing program 1: [ 876.154831] audit: type=1326 audit(1529688593.153:1710): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23560 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) vmsplice(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0) 17:29:53 executing program 2: 17:29:53 executing program 4: 17:29:53 executing program 3: [ 876.297441] audit: type=1326 audit(1529688593.296:1711): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23569 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:29:53 executing program 0: 17:29:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) socket$inet(0x2, 0x0, 0x0) 17:29:53 executing program 1: 17:29:53 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000006100)) ioctl$EVIOCSKEYCODE(r1, 0x40084504, &(0x7f0000000000)) 17:29:53 executing program 3: get_robust_list(0x0, &(0x7f0000000400)=&(0x7f00000003c0)={&(0x7f0000000340)={&(0x7f0000000300)}, 0x0, &(0x7f0000000380)}, &(0x7f0000000440)=0x18) get_robust_list(0x0, &(0x7f00000001c0)=&(0x7f0000000180)={&(0x7f00000000c0)={&(0x7f0000000080)}, 0x0, &(0x7f0000000140)={&(0x7f0000000100)}}, &(0x7f0000000200)=0x18) 17:29:53 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/12) 17:29:53 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000006100)) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}) 17:29:53 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000006100)) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f0000000240)) 17:29:53 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000006100)) ioctl$EVIOCSKEYCODE(r1, 0x40084504, &(0x7f0000000000)) 17:29:54 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/12) 17:29:54 executing program 3: get_robust_list(0x0, &(0x7f0000000400)=&(0x7f00000003c0)={&(0x7f0000000340)={&(0x7f0000000300)}, 0x0, &(0x7f0000000380)}, &(0x7f0000000440)=0x18) get_robust_list(0x0, &(0x7f00000001c0)=&(0x7f0000000180)={&(0x7f00000000c0)={&(0x7f0000000080)}, 0x0, &(0x7f0000000140)={&(0x7f0000000100)}}, &(0x7f0000000200)=0x18) 17:29:54 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000006100)) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}) 17:29:54 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/12) 17:29:54 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000100)) ioctl$EVIOCGPHYS(r2, 0x80404507, &(0x7f00000005c0)=""/73) 17:29:54 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000006100)) ioctl$EVIOCSKEYCODE(r1, 0x40084504, &(0x7f0000000000)) 17:29:54 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f0000000000)={0x7}) 17:29:54 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) 17:29:54 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) syz_fuseblk_mount(&(0x7f00000027c0)='./file1\x00', &(0x7f0000002800)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f00000004c0)={&(0x7f0000000340)={0x14}, 0x14}, 0x1}, 0x0) 17:29:54 executing program 3: get_robust_list(0x0, &(0x7f0000000400)=&(0x7f00000003c0)={&(0x7f0000000340)={&(0x7f0000000300)}, 0x0, &(0x7f0000000380)}, &(0x7f0000000440)=0x18) get_robust_list(0x0, &(0x7f00000001c0)=&(0x7f0000000180)={&(0x7f00000000c0)={&(0x7f0000000080)}, 0x0, &(0x7f0000000140)={&(0x7f0000000100)}}, &(0x7f0000000200)=0x18) 17:29:54 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000006100)) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}) 17:29:54 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/12) 17:29:54 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000006100)) ioctl$EVIOCSKEYCODE(r1, 0x40084504, &(0x7f0000000000)) 17:29:54 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) close(r0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000100)=""/81) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000001c0), 0x0) 17:29:54 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$EVIOCSABS3F(r1, 0x401845ff, &(0x7f0000000100)) ioctl$KDSETKEYCODE(r1, 0x4b4d, &(0x7f0000000080)) 17:29:54 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f0000000000)={0x7}) 17:29:54 executing program 3: get_robust_list(0x0, &(0x7f0000000400)=&(0x7f00000003c0)={&(0x7f0000000340)={&(0x7f0000000300)}, 0x0, &(0x7f0000000380)}, &(0x7f0000000440)=0x18) get_robust_list(0x0, &(0x7f00000001c0)=&(0x7f0000000180)={&(0x7f00000000c0)={&(0x7f0000000080)}, 0x0, &(0x7f0000000140)={&(0x7f0000000100)}}, &(0x7f0000000200)=0x18) 17:29:54 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$EVIOCSKEYCODE(r1, 0x40084504, &(0x7f0000000000)) 17:29:54 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000140)=""/12) 17:29:54 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = dup2(r0, r1) ioctl$TIOCLINUX6(r2, 0x541c, &(0x7f0000000040)={0x6}) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, 0xffffffffffffffff) 17:29:54 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f0000000000)={0x7}) 17:29:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) timer_getoverrun(0x0) 17:29:54 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000006100)) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}) 17:29:54 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) syz_fuseblk_mount(&(0x7f00000027c0)='./file1\x00', &(0x7f0000002800)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) 17:29:54 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000140)=""/12) 17:29:54 executing program 3: get_robust_list(0x0, &(0x7f00000001c0)=&(0x7f0000000180)={&(0x7f00000000c0)={&(0x7f0000000080)}, 0x0, &(0x7f0000000140)={&(0x7f0000000100)}}, &(0x7f0000000200)=0x18) 17:29:54 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$EVIOCSKEYCODE(r1, 0x40084504, &(0x7f0000000000)) 17:29:54 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f0000000000)={0x7}) 17:29:54 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}) 17:29:55 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000006100)) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000000)) 17:29:55 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) r1 = dup2(r0, r0) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f0000000400)=""/230) 17:29:55 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000140)=""/12) 17:29:55 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$EVIOCSKEYCODE(r1, 0x40084504, &(0x7f0000000000)) 17:29:55 executing program 3: get_robust_list(0x0, &(0x7f00000001c0)=&(0x7f0000000180)={&(0x7f00000000c0)={&(0x7f0000000080)}, 0x0, &(0x7f0000000140)={&(0x7f0000000100)}}, &(0x7f0000000200)=0x18) 17:29:55 executing program 6: r0 = socket(0x1, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000100), 0x8) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000080), 0x4) 17:29:55 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}) 17:29:55 executing program 1: r0 = socket(0x1, 0x2, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000600)={0x303, 0x33}, 0x4) setsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f0000000080), 0x1) 17:29:55 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/12) 17:29:55 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000006100)) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000000)) 17:29:55 executing program 4: socket$key(0xf, 0x3, 0x2) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000006100)) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000000)) 17:29:55 executing program 3: get_robust_list(0x0, &(0x7f00000001c0)=&(0x7f0000000180)={&(0x7f00000000c0)={&(0x7f0000000080)}, 0x0, &(0x7f0000000140)={&(0x7f0000000100)}}, &(0x7f0000000200)=0x18) 17:29:55 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) r1 = dup2(r0, r0) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f0000000400)=""/230) 17:29:55 executing program 1: pipe(&(0x7f0000000500)={0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x5, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000040)="0700e1311f16f477671070") ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000080)) 17:29:55 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}) 17:29:55 executing program 6: r0 = socket(0x1, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000100), 0x8) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000080), 0x4) 17:29:55 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/12) 17:29:55 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000006100)) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000000)) 17:29:55 executing program 4: socket$key(0xf, 0x3, 0x2) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000006100)) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000000)) 17:29:55 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) r1 = dup2(r0, r0) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f0000000400)=""/230) 17:29:55 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f0000000500)) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000280)) ioctl$sock_inet_sctp_SIOCINQ(r1, 0x541b, &(0x7f0000000240)) 17:29:55 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/12) 17:29:55 executing program 1: pipe(&(0x7f0000000500)={0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x5, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000040)="0700e1311f16f477671070") ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000080)) 17:29:55 executing program 6: r0 = socket(0x1, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000100), 0x8) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000080), 0x4) 17:29:55 executing program 0: socket$key(0xf, 0x3, 0x2) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000006100)) ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}) 17:29:55 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000006100)) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000000)) 17:29:55 executing program 4: socket$key(0xf, 0x3, 0x2) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000006100)) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000000)) 17:29:55 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f0000000500)) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000280)) ioctl$sock_inet_sctp_SIOCINQ(r1, 0x541b, &(0x7f0000000240)) 17:29:55 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) r1 = dup2(r0, r0) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f0000000400)=""/230) 17:29:55 executing program 2: ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f0000000140)=""/12) 17:29:55 executing program 6: r0 = socket(0x1, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000100), 0x8) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000080), 0x4) 17:29:55 executing program 0: socket$key(0xf, 0x3, 0x2) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000006100)) ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}) 17:29:55 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000000)) 17:29:56 executing program 1: pipe(&(0x7f0000000500)={0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x5, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000040)="0700e1311f16f477671070") ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000080)) 17:29:56 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f0000000500)) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000280)) ioctl$sock_inet_sctp_SIOCINQ(r1, 0x541b, &(0x7f0000000240)) 17:29:56 executing program 4: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000006100)) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000000)) 17:29:56 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000000400)=""/230) 17:29:56 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000000)) 17:29:56 executing program 2: ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f0000000140)=""/12) 17:29:56 executing program 0: socket$key(0xf, 0x3, 0x2) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000006100)) ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}) 17:29:56 executing program 6: r0 = socket(0x1, 0x3, 0x0) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000080), 0x4) 17:29:56 executing program 1: pipe(&(0x7f0000000500)={0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x5, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000040)="0700e1311f16f477671070") ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000080)) 17:29:56 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f0000000500)) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000280)) ioctl$sock_inet_sctp_SIOCINQ(r1, 0x541b, &(0x7f0000000240)) 17:29:56 executing program 4: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000006100)) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000000)) 17:29:56 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000000400)=""/230) 17:29:56 executing program 2: ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f0000000140)=""/12) 17:29:56 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000000)) 17:29:56 executing program 0: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000006100)) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}) 17:29:56 executing program 6: r0 = socket(0x1, 0x3, 0x0) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000080), 0x4) 17:29:56 executing program 1: pipe(&(0x7f0000000500)={0xffffffffffffffff}) socket$inet6(0xa, 0x5, 0x0) ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000080)) 17:29:56 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f0000000500)) ioctl$sock_inet_sctp_SIOCINQ(r1, 0x541b, &(0x7f0000000240)) 17:29:56 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000000400)=""/230) 17:29:56 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/12) 17:29:56 executing program 5: socket$key(0xf, 0x3, 0x2) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000006100)) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f0000000000)) 17:29:56 executing program 4: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000006100)) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000000)) 17:29:56 executing program 1: pipe(&(0x7f0000000500)={0xffffffffffffffff}) socket$inet6(0xa, 0x5, 0x0) ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000080)) 17:29:56 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f0000000400)=""/230) 17:29:56 executing program 0: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000006100)) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}) 17:29:56 executing program 5: socket$key(0xf, 0x3, 0x2) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000006100)) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f0000000000)) 17:29:56 executing program 6: r0 = socket(0x1, 0x3, 0x0) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000080), 0x4) 17:29:56 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/12) 17:29:56 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f0000000500)) ioctl$sock_inet_sctp_SIOCINQ(r1, 0x541b, &(0x7f0000000240)) 17:29:56 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(0xffffffffffffffff, r0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000006100)) ioctl$EVIOCSKEYCODE(r1, 0x40084504, &(0x7f0000000000)) 17:29:57 executing program 5: socket$key(0xf, 0x3, 0x2) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000006100)) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f0000000000)) 17:29:57 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f0000000400)=""/230) 17:29:57 executing program 1: pipe(&(0x7f0000000500)={0xffffffffffffffff}) socket$inet6(0xa, 0x5, 0x0) ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000080)) 17:29:57 executing program 6: setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(0xffffffffffffffff, 0x28, 0x2, &(0x7f0000000100), 0x8) setsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000080), 0x4) 17:29:57 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/12) 17:29:57 executing program 0: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000006100)) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}) 17:29:57 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(0xffffffffffffffff, r0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000006100)) ioctl$EVIOCSKEYCODE(r1, 0x40084504, &(0x7f0000000000)) 17:29:57 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f0000000500)) ioctl$sock_inet_sctp_SIOCINQ(r1, 0x541b, &(0x7f0000000240)) 17:29:57 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f0000000400)=""/230) 17:29:57 executing program 5: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000006100)) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000000)) 17:29:57 executing program 6: setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(0xffffffffffffffff, 0x28, 0x2, &(0x7f0000000100), 0x8) setsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000080), 0x4) 17:29:57 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(0xffffffffffffffff, r0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000006100)) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}) 17:29:57 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/12) 17:29:57 executing program 1: pipe(&(0x7f0000000500)={0xffffffffffffffff}) ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000040)="0700e1311f16f477671070") ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000080)) 17:29:57 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(0xffffffffffffffff, r0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000006100)) ioctl$EVIOCSKEYCODE(r1, 0x40084504, &(0x7f0000000000)) 17:29:57 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000280)) ioctl$sock_inet_sctp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000240)) 17:29:57 executing program 7: ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f0000000400)=""/230) 17:29:57 executing program 6: setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(0xffffffffffffffff, 0x28, 0x2, &(0x7f0000000100), 0x8) setsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000080), 0x4) 17:29:57 executing program 5: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000006100)) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000000)) 17:29:57 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(0xffffffffffffffff, r0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000006100)) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}) 17:29:57 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/12) 17:29:57 executing program 1: pipe(&(0x7f0000000500)={0xffffffffffffffff}) ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000040)="0700e1311f16f477671070") ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000080)) 17:29:57 executing program 7: ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f0000000400)=""/230) 17:29:57 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000280)) ioctl$sock_inet_sctp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000240)) 17:29:57 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, 0xffffffffffffffff) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000006100)) ioctl$EVIOCSKEYCODE(r1, 0x40084504, &(0x7f0000000000)) 17:29:57 executing program 6: r0 = socket(0x0, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000100), 0x8) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000080), 0x4) 17:29:57 executing program 5: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000006100)) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000000)) 17:29:57 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/12) 17:29:57 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(0xffffffffffffffff, r0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000006100)) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}) 17:29:57 executing program 1: pipe(&(0x7f0000000500)={0xffffffffffffffff}) ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000040)="0700e1311f16f477671070") ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000080)) 17:29:58 executing program 7: ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f0000000400)=""/230) 17:29:58 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000280)) ioctl$sock_inet_sctp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000240)) 17:29:58 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(0xffffffffffffffff, r0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000006100)) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000000)) 17:29:58 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, 0xffffffffffffffff) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000006100)) ioctl$EVIOCSKEYCODE(r1, 0x40084504, &(0x7f0000000000)) 17:29:58 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/12) 17:29:58 executing program 6: r0 = socket(0x0, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000100), 0x8) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000080), 0x4) 17:29:58 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000040)="0700e1311f16f477671070") ioctl$SIOCGIFMTU(0xffffffffffffffff, 0x8921, &(0x7f0000000080)) 17:29:58 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) r1 = dup2(r0, r0) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f0000000400)=""/230) 17:29:58 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, 0xffffffffffffffff) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000006100)) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}) 17:29:58 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept(r0, 0x0, &(0x7f0000000500)) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000280)) ioctl$sock_inet_sctp_SIOCINQ(r1, 0x541b, &(0x7f0000000240)) 17:29:58 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(0xffffffffffffffff, r0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000006100)) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000000)) 17:29:58 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, 0xffffffffffffffff) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000006100)) ioctl$EVIOCSKEYCODE(r1, 0x40084504, &(0x7f0000000000)) 17:29:58 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/12) 17:29:58 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) r1 = dup2(r0, r0) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f0000000400)=""/230) 17:29:58 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000040)="0700e1311f16f477671070") ioctl$SIOCGIFMTU(0xffffffffffffffff, 0x8921, &(0x7f0000000080)) 17:29:58 executing program 6: r0 = socket(0x0, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000100), 0x8) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000080), 0x4) 17:29:58 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, 0xffffffffffffffff) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000006100)) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}) 17:29:58 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(0xffffffffffffffff, r0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000006100)) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000000)) 17:29:58 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept(r0, 0x0, &(0x7f0000000500)) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000280)) ioctl$sock_inet_sctp_SIOCINQ(r1, 0x541b, &(0x7f0000000240)) 17:29:58 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000006100)) ioctl$EVIOCSKEYCODE(r1, 0x40084504, &(0x7f0000000000)) 17:29:58 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/12) 17:29:58 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000040)="0700e1311f16f477671070") ioctl$SIOCGIFMTU(0xffffffffffffffff, 0x8921, &(0x7f0000000080)) 17:29:58 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) r1 = dup2(r0, r0) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f0000000400)=""/230) 17:29:58 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, 0xffffffffffffffff) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000006100)) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}) 17:29:58 executing program 6: r0 = socket(0x1, 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000100), 0x8) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000080), 0x4) 17:29:58 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, 0xffffffffffffffff) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000006100)) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000000)) 17:29:58 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept(r0, 0x0, &(0x7f0000000500)) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000280)) ioctl$sock_inet_sctp_SIOCINQ(r1, 0x541b, &(0x7f0000000240)) 17:29:58 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000006100)) ioctl$EVIOCSKEYCODE(r1, 0x40084504, &(0x7f0000000000)) 17:29:58 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f0000000400)=""/230) 17:29:58 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000140)=""/12) 17:29:58 executing program 1: pipe(&(0x7f0000000500)={0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x0, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000040)="0700e1311f16f477671070") ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000080)) 17:29:59 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, 0xffffffffffffffff) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000006100)) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000000)) 17:29:59 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000006100)) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}) 17:29:59 executing program 6: r0 = socket(0x1, 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000100), 0x8) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000080), 0x4) 17:29:59 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000006100)) ioctl$EVIOCSKEYCODE(r1, 0x40084504, &(0x7f0000000000)) 17:29:59 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f0000000400)=""/230) 17:29:59 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r0 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000500)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000280)) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f0000000240)) 17:29:59 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000140)=""/12) 17:29:59 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, 0xffffffffffffffff) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000006100)) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000000)) 17:29:59 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000006100)) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}) 17:29:59 executing program 1: pipe(&(0x7f0000000500)={0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x0, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000040)="0700e1311f16f477671070") ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000080)) 17:29:59 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000006100)) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000000)) 17:29:59 executing program 6: r0 = socket(0x1, 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000100), 0x8) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000080), 0x4) 17:29:59 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f0000000400)=""/230) 17:29:59 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r0 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000500)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000280)) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f0000000240)) 17:29:59 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000140)=""/12) 17:29:59 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000006100)) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000000)) 17:29:59 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000006100)) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}) 17:29:59 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f0000000400)=""/230) 17:29:59 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000006100)) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000000)) 17:29:59 executing program 6: r0 = socket(0x1, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(0xffffffffffffffff, 0x28, 0x2, &(0x7f0000000100), 0x8) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000080), 0x4) 17:29:59 executing program 2: r0 = socket(0x1, 0x2, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000040), 0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000280), 0x8) 17:29:59 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r0 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000500)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000280)) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f0000000240)) 17:29:59 executing program 1: pipe(&(0x7f0000000500)={0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x0, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000040)="0700e1311f16f477671070") ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000080)) 17:29:59 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000006100)) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000000)) 17:29:59 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000006100)) ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}) 17:29:59 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f0000000400)=""/230) 17:29:59 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000006100)) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000000)) 17:30:00 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f0000000500)) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000280)) ioctl$sock_inet_sctp_SIOCINQ(r1, 0x541b, &(0x7f0000000240)) 17:30:00 executing program 2: r0 = socket(0x1, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000300)={{{@in=@local, @in=@multicast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@dev}}, &(0x7f0000000400)=0x487) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000280), &(0x7f00000002c0)=0x4) 17:30:00 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000006100)) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000000)) 17:30:00 executing program 6: r0 = socket(0x1, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(0xffffffffffffffff, 0x28, 0x2, &(0x7f0000000100), 0x8) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000080), 0x4) 17:30:00 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f0000000400)=""/230) 17:30:00 executing program 1: pipe(&(0x7f0000000500)={0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x5, 0x0) ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000040)="0700e1311f16f477671070") ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000080)) 17:30:00 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x5, &(0x7f00000001c0), 0x4) 17:30:00 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000006100)) ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}) 17:30:00 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000006100)) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f0000000000)) 17:30:00 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f0000000500)) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000280)) ioctl$sock_inet_sctp_SIOCINQ(r1, 0x541b, &(0x7f0000000240)) 17:30:00 executing program 6: r0 = socket(0x1, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(0xffffffffffffffff, 0x28, 0x2, &(0x7f0000000100), 0x8) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000080), 0x4) 17:30:00 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) r1 = dup2(r0, r0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000000400)=""/230) 17:30:00 executing program 2: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f00000000c0), 0x4) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x10) 17:30:00 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000006100)) ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}) 17:30:00 executing program 1: pipe(&(0x7f0000000500)={0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x5, 0x0) ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000040)="0700e1311f16f477671070") ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000080)) 17:30:00 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x5, &(0x7f00000001c0), 0x4) 17:30:00 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000006100)) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f0000000000)) 17:30:00 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f0000000500)) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000280)) ioctl$sock_inet_sctp_SIOCINQ(r1, 0x541b, &(0x7f0000000240)) 17:30:00 executing program 6: r0 = socket(0x1, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000100), 0x8) setsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000080), 0x4) 17:30:00 executing program 0: r0 = socket(0x1, 0x2, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, &(0x7f0000000180)=0x84) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) 17:30:00 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) r1 = dup2(r0, r0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000000400)=""/230) 17:30:00 executing program 2: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f00000000c0), 0x4) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x10) 17:30:00 executing program 1: pipe(&(0x7f0000000500)={0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x5, 0x0) ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000040)="0700e1311f16f477671070") ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000080)) 17:30:00 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x5, &(0x7f00000001c0), 0x4) 17:30:00 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000006100)) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f0000000000)) 17:30:00 executing program 6: r0 = socket(0x1, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000100), 0x8) setsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000080), 0x4) 17:30:00 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) r1 = dup2(r0, r0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000000400)=""/230) 17:30:00 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000500)) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000280)) ioctl$sock_inet_sctp_SIOCINQ(r1, 0x541b, &(0x7f0000000240)) 17:30:00 executing program 2: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f00000000c0), 0x4) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x10) 17:30:00 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$inet_opts(r1, 0x0, 0x0, &(0x7f0000000040), 0x0) setsockopt$RDS_FREE_MR(r1, 0x114, 0x3, &(0x7f00000000c0), 0x10) 17:30:00 executing program 1: pipe(&(0x7f0000000500)={0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x5, 0x0) ioctl(r1, 0x0, &(0x7f0000000040)="0700e1311f16f477671070") ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000080)) 17:30:01 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x5, &(0x7f00000001c0), 0x4) 17:30:01 executing program 2: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f00000000c0), 0x4) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x10) 17:30:01 executing program 6: r0 = socket(0x1, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000100), 0x8) setsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000080), 0x4) 17:30:01 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000500)) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000280)) ioctl$sock_inet_sctp_SIOCINQ(r1, 0x541b, &(0x7f0000000240)) 17:30:01 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000040)="2957e1311f16f477671070") r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000300)={0x0, {0x2}, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @broadcast=0xffffffff}}) 17:30:01 executing program 1: pipe(&(0x7f0000000500)={0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x5, 0x0) ioctl(r1, 0x0, &(0x7f0000000040)="0700e1311f16f477671070") ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000080)) 17:30:01 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x5, &(0x7f00000001c0), 0x4) 17:30:01 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000500)) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000280)) ioctl$sock_inet_sctp_SIOCINQ(r1, 0x541b, &(0x7f0000000240)) 17:30:01 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000180)={'bridge_slave_1\x00', 0x89c}) 17:30:01 executing program 2: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x10) 17:30:01 executing program 1: pipe(&(0x7f0000000500)={0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x5, 0x0) ioctl(r1, 0x0, &(0x7f0000000040)="0700e1311f16f477671070") ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000080)) 17:30:01 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x5, &(0x7f00000001c0), 0x4) 17:30:01 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000180)={'bridge_slave_1\x00', 0x89c}) 17:30:01 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f0000000500)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000280)) ioctl$sock_inet_sctp_SIOCINQ(r1, 0x541b, &(0x7f0000000240)) 17:30:01 executing program 2: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x10) 17:30:01 executing program 1: pipe(&(0x7f0000000500)={0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x5, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000040)) ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000080)) 17:30:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f00000000c0)=0x5f) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0x8) getsockopt$inet_dccp_buf(r1, 0x21, 0x0, &(0x7f0000000280)=""/254, &(0x7f0000000000)=0xfe) 17:30:01 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f0000000500)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000280)) ioctl$sock_inet_sctp_SIOCINQ(r1, 0x541b, &(0x7f0000000240)) 17:30:01 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x5, &(0x7f00000001c0), 0x4) 17:30:01 executing program 2: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x10) 17:30:01 executing program 1: pipe(&(0x7f0000000500)={0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x5, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000040)) ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000080)) 17:30:01 executing program 0: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140), &(0x7f00000002c0)=0x8) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000001880), 0xc) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000000), 0x4) 17:30:01 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000001c0), 0x4) 17:30:01 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f0000000500)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000280)) ioctl$sock_inet_sctp_SIOCINQ(r1, 0x541b, &(0x7f0000000240)) 17:30:01 executing program 2: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000000c0), 0x4) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x10) 17:30:01 executing program 1: pipe(&(0x7f0000000500)={0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x5, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000040)) ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000080)) 17:30:01 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f0000000500)) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000280)) ioctl$sock_inet_sctp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000240)) 17:30:01 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000002cc0)={0x0, @in={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, &(0x7f0000002dc0)=0x100) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f00000000c0)=""/150, &(0x7f0000000000)=0x96) 17:30:01 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000001c0), 0x4) 17:30:01 executing program 2: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000000c0), 0x4) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x10) 17:30:02 executing program 1: pipe(&(0x7f0000000500)={0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x5, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000040)="0700e1311f16") ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000080)) 17:30:02 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000002cc0)={0x0, @in={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, &(0x7f0000002dc0)=0x100) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f00000000c0)=""/150, &(0x7f0000000000)=0x96) 17:30:02 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f0000000500)) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000280)) ioctl$sock_inet_sctp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000240)) 17:30:02 executing program 2: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000000c0), 0x4) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x10) 17:30:02 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000001c0), 0x4) 17:30:02 executing program 1: pipe(&(0x7f0000000500)={0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x5, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000040)="0700e1311f16") ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000080)) 17:30:02 executing program 2: socket$inet6(0xa, 0x80000000005, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f00000000c0), 0x4) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x10) 17:30:02 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000002cc0)={0x0, @in={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, &(0x7f0000002dc0)=0x100) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f00000000c0)=""/150, &(0x7f0000000000)=0x96) 17:30:02 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f0000000500)) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000280)) ioctl$sock_inet_sctp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000240)) 17:30:02 executing program 4: socket$inet6(0xa, 0x1, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x5, &(0x7f00000001c0), 0x4) 17:30:02 executing program 1: pipe(&(0x7f0000000500)={0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x5, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000040)="0700e1311f16") ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000080)) 17:30:02 executing program 2: socket$inet6(0xa, 0x80000000005, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f00000000c0), 0x4) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x10) 17:30:02 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000002cc0)={0x0, @in={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, &(0x7f0000002dc0)=0x100) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f00000000c0)=""/150, &(0x7f0000000000)=0x96) 17:30:02 executing program 4: socket$inet6(0xa, 0x1, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x5, &(0x7f00000001c0), 0x4) 17:30:02 executing program 1: pipe(&(0x7f0000000500)={0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x5, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000040)="0700e1311f16f47767") ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000080)) 17:30:02 executing program 2: socket$inet6(0xa, 0x80000000005, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f00000000c0), 0x4) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x10) 17:30:02 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f00000000c0)=""/150, &(0x7f0000000000)=0x96) 17:30:02 executing program 4: socket$inet6(0xa, 0x1, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x5, &(0x7f00000001c0), 0x4) 17:30:02 executing program 1: pipe(&(0x7f0000000500)={0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x5, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000040)="0700e1311f16f47767") ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000080)) 17:30:02 executing program 2: ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f00000000c0), 0x4) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x10) 17:30:02 executing program 4: ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x5, &(0x7f00000001c0), 0x4) 17:30:02 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f00000000c0)=""/150, &(0x7f0000000000)=0x96) 17:30:02 executing program 1: pipe(&(0x7f0000000500)={0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x5, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000040)="0700e1311f16f47767") ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000080)) 17:30:02 executing program 2: ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f00000000c0), 0x4) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x10) 17:30:02 executing program 4: ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x5, &(0x7f00000001c0), 0x4) 17:30:02 executing program 1: pipe(&(0x7f0000000500)={0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x5, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000040)="0700e1311f16f4776710") ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000080)) 17:30:02 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f00000000c0)=""/150, &(0x7f0000000000)=0x96) 17:30:02 executing program 4: ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x5, &(0x7f00000001c0), 0x4) 17:30:02 executing program 2: ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f00000000c0), 0x4) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x10) 17:30:03 executing program 1: pipe(&(0x7f0000000500)={0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x5, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000040)="0700e1311f16f4776710") ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000080)) 17:30:03 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000002cc0)={0x0, @in={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, &(0x7f0000002dc0)=0x100) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f00000000c0)=""/150, &(0x7f0000000000)=0x96) 17:30:03 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x5, &(0x7f00000001c0), 0x4) 17:30:03 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f00000000c0), 0x4) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x10) 17:30:03 executing program 1: pipe(&(0x7f0000000500)={0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x5, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000040)="0700e1311f16f4776710") ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000080)) 17:30:03 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000002cc0)={0x0, @in={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, &(0x7f0000002dc0)=0x100) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f00000000c0)=""/150, &(0x7f0000000000)=0x96) 17:30:03 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x5, &(0x7f00000001c0), 0x4) 17:30:03 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000002cc0)={0x0, @in={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, &(0x7f0000002dc0)=0x100) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f00000000c0)=""/150, &(0x7f0000000000)=0x96) 17:30:03 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f00000000c0), 0x4) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x10) 17:30:03 executing program 1: pipe(&(0x7f0000000500)={0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x5, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000040)="0700e1311f16f477671070") ioctl$SIOCGIFMTU(0xffffffffffffffff, 0x8921, &(0x7f0000000080)) 17:30:03 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000002cc0)={0x0, @in={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, &(0x7f0000002dc0)=0x100) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f00000000c0)=""/150, &(0x7f0000000000)=0x96) 17:30:03 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000040)="2957e1311f16f477671070") r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000000)) 17:30:03 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000300)) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:30:03 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) syz_fuseblk_mount(&(0x7f00000027c0)='./file1\x00', &(0x7f0000002800)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) 17:30:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) get_robust_list(0x0, &(0x7f0000000140)=&(0x7f0000000080)={&(0x7f0000000040)={&(0x7f0000000000)}}, &(0x7f00000001c0)=0x18) 17:30:03 executing program 1: pipe(&(0x7f0000000500)={0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x5, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000040)="0700e1311f16f477671070") ioctl$SIOCGIFMTU(0xffffffffffffffff, 0x8921, &(0x7f0000000080)) 17:30:03 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x5, &(0x7f00000001c0), 0x4) 17:30:03 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000002cc0)={0x0, @in={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, &(0x7f0000002dc0)=0x100) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f00000000c0)=""/150, &(0x7f0000000000)=0x96) 17:30:03 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f00000000c0), 0x4) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x10) 17:30:03 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f00000001c0), 0x4) 17:30:03 executing program 1: pipe(&(0x7f0000000500)={0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x5, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000040)="0700e1311f16f477671070") ioctl$SIOCGIFMTU(0xffffffffffffffff, 0x8921, &(0x7f0000000080)) 17:30:03 executing program 3: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000001200)=@assoc_value, &(0x7f0000001240)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x4, &(0x7f0000001280), &(0x7f0000001340)=0x8) 17:30:03 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000300)) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:30:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) get_robust_list(0x0, &(0x7f0000000140)=&(0x7f0000000080)={&(0x7f0000000040)={&(0x7f0000000000)}}, &(0x7f00000001c0)=0x18) 17:30:03 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000002cc0)={0x0, @in={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, &(0x7f0000002dc0)=0x100) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f00000000c0)=""/150, &(0x7f0000000000)=0x96) 17:30:03 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x5, &(0x7f00000001c0), 0x4) 17:30:03 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000040)="2957e1311f16f477671070") r1 = socket$l2tp(0x18, 0x1, 0x1) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000280), 0x0) 17:30:03 executing program 2: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f00000000c0), 0x4) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x10) 17:30:03 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f00000001c0), 0x4) 17:30:04 executing program 3: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000001200)=@assoc_value, &(0x7f0000001240)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x4, &(0x7f0000001280), &(0x7f0000001340)=0x8) 17:30:04 executing program 0: r0 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000002cc0)={0x0, @in={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, &(0x7f0000002dc0)=0x100) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f00000000c0)=""/150, &(0x7f0000000000)=0x96) 17:30:04 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x5, &(0x7f00000001c0), 0x4) 17:30:04 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000300)) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:30:04 executing program 2: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f00000000c0), 0x4) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x10) 17:30:04 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f00000001c0), 0x4) 17:30:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) get_robust_list(0x0, &(0x7f0000000140)=&(0x7f0000000080)={&(0x7f0000000040)={&(0x7f0000000000)}}, &(0x7f00000001c0)=0x18) 17:30:04 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000300), &(0x7f0000000340)=0xc) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) 17:30:04 executing program 3: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000001200)=@assoc_value, &(0x7f0000001240)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x4, &(0x7f0000001280), &(0x7f0000001340)=0x8) 17:30:04 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x5, &(0x7f00000001c0), 0x4) 17:30:04 executing program 0: r0 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000002cc0)={0x0, @in={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, &(0x7f0000002dc0)=0x100) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f00000000c0)=""/150, &(0x7f0000000000)=0x96) 17:30:04 executing program 2: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f00000000c0), 0x4) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x10) 17:30:04 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000300)) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:30:04 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f00000001c0), 0x4) 17:30:04 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000300), &(0x7f0000000340)=0xc) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) 17:30:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) get_robust_list(0x0, &(0x7f0000000140)=&(0x7f0000000080)={&(0x7f0000000040)={&(0x7f0000000000)}}, &(0x7f00000001c0)=0x18) 17:30:04 executing program 3: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000001200)=@assoc_value, &(0x7f0000001240)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x4, &(0x7f0000001280), &(0x7f0000001340)=0x8) 17:30:04 executing program 2: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x0, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f00000000c0), 0x4) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x10) 17:30:04 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)="295ee1311f16f477671070") r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x5, &(0x7f00000001c0), 0x4) 17:30:04 executing program 0: r0 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000002cc0)={0x0, @in={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, &(0x7f0000002dc0)=0x100) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f00000000c0)=""/150, &(0x7f0000000000)=0x96) 17:30:04 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f00000001c0), 0x4) 17:30:04 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:30:04 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000300), &(0x7f0000000340)=0xc) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) 17:30:04 executing program 3: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x4, &(0x7f0000001280), &(0x7f0000001340)=0x8) 17:30:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) get_robust_list(0x0, &(0x7f0000000140)=&(0x7f0000000080)={&(0x7f0000000040)={&(0x7f0000000000)}}, &(0x7f00000001c0)=0x18) 17:30:04 executing program 2: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x0, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f00000000c0), 0x4) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x10) 17:30:04 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)="295ee1311f16f477671070") r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x5, &(0x7f00000001c0), 0x4) 17:30:04 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000002cc0)={0x0, @in={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, &(0x7f0000002dc0)=0x100) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f00000000c0)=""/150, &(0x7f0000000000)=0x96) 17:30:05 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f00000001c0), 0x4) 17:30:05 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000300), &(0x7f0000000340)=0xc) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) 17:30:05 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:30:05 executing program 3: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x4, &(0x7f0000001280), &(0x7f0000001340)=0x8) 17:30:05 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) get_robust_list(0x0, &(0x7f0000000140)=&(0x7f0000000080)={&(0x7f0000000040)={&(0x7f0000000000)}}, &(0x7f00000001c0)=0x18) 17:30:05 executing program 2: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x0, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f00000000c0), 0x4) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x10) 17:30:05 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)="295ee1311f16f477671070") r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x5, &(0x7f00000001c0), 0x4) 17:30:05 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000002cc0)={0x0, @in={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, &(0x7f0000002dc0)=0x100) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f00000000c0)=""/150, &(0x7f0000000000)=0x96) 17:30:05 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f00000001c0), 0x4) 17:30:05 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) 17:30:05 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:30:05 executing program 2: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f00000000c0), 0x4) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x10) 17:30:05 executing program 3: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x4, &(0x7f0000001280), &(0x7f0000001340)=0x8) 17:30:05 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) get_robust_list(0x0, &(0x7f0000000140)=&(0x7f0000000080)={&(0x7f0000000040)={&(0x7f0000000000)}}, &(0x7f00000001c0)=0x18) 17:30:05 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000002cc0)={0x0, @in={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, &(0x7f0000002dc0)=0x100) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f00000000c0)=""/150, &(0x7f0000000000)=0x96) 17:30:05 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x5, &(0x7f00000001c0), 0x4) 17:30:05 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f00000001c0), 0x4) 17:30:05 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) 17:30:05 executing program 5: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000300)) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:30:05 executing program 3: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000001200)=@assoc_value, &(0x7f0000001240)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000001280), &(0x7f0000001340)=0x8) 17:30:05 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000002cc0)={0x0, @in={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, &(0x7f0000002dc0)=0x100) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f00000000c0)=""/150, &(0x7f0000000000)=0x96) 17:30:05 executing program 2: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f00000000c0), 0x4) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x10) 17:30:05 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x5, &(0x7f00000001c0), 0x4) 17:30:05 executing program 6: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) get_robust_list(0x0, &(0x7f0000000140)=&(0x7f0000000080)={&(0x7f0000000040)={&(0x7f0000000000)}}, &(0x7f00000001c0)=0x18) 17:30:05 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f00000001c0), 0x4) 17:30:05 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) 17:30:05 executing program 3: r0 = socket$inet6(0xa, 0x80000000005, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000001200)=@assoc_value, &(0x7f0000001240)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x4, &(0x7f0000001280), &(0x7f0000001340)=0x8) 17:30:05 executing program 5: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000300)) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:30:05 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000002cc0)={0x0, @in={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, &(0x7f0000002dc0)=0x100) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f00000000c0)=""/150, &(0x7f0000000000)=0x96) 17:30:06 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x5, &(0x7f00000001c0), 0x4) 17:30:06 executing program 6: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) get_robust_list(0x0, &(0x7f0000000140)=&(0x7f0000000080)={&(0x7f0000000040)={&(0x7f0000000000)}}, &(0x7f00000001c0)=0x18) 17:30:06 executing program 2: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f00000000c0), 0x4) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x10) 17:30:06 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f00000001c0), 0x4) 17:30:06 executing program 1: getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000300), &(0x7f0000000340)=0xc) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) 17:30:06 executing program 5: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000300)) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:30:06 executing program 3: r0 = socket$inet6(0xa, 0x80000000005, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000001200)=@assoc_value, &(0x7f0000001240)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x4, &(0x7f0000001280), &(0x7f0000001340)=0x8) 17:30:06 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000002cc0)={0x0, @in={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, &(0x7f0000002dc0)=0x100) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f00000000c0)=""/150, &(0x7f0000000000)=0x96) 17:30:06 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16") r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x5, &(0x7f00000001c0), 0x4) 17:30:06 executing program 6: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) get_robust_list(0x0, &(0x7f0000000140)=&(0x7f0000000080)={&(0x7f0000000040)={&(0x7f0000000000)}}, &(0x7f00000001c0)=0x18) 17:30:06 executing program 2: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f00000000c0), 0x4) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x10) 17:30:06 executing program 7: socket$inet6(0xa, 0x1, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f00000001c0), 0x4) 17:30:06 executing program 5: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000300)) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:30:06 executing program 1: getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000300), &(0x7f0000000340)=0xc) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) 17:30:06 executing program 3: r0 = socket$inet6(0xa, 0x80000000005, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000001200)=@assoc_value, &(0x7f0000001240)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x4, &(0x7f0000001280), &(0x7f0000001340)=0x8) 17:30:06 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000002cc0)={0x0, @in={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, &(0x7f0000002dc0)=0x100) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f00000000c0)=""/150, &(0x7f0000000000)=0x96) 17:30:06 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16") r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x5, &(0x7f00000001c0), 0x4) 17:30:06 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) get_robust_list(0x0, &(0x7f0000000140)=&(0x7f0000000080)={&(0x7f0000000040)={&(0x7f0000000000)}}, &(0x7f00000001c0)=0x18) 17:30:06 executing program 7: socket$inet6(0xa, 0x1, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f00000001c0), 0x4) 17:30:06 executing program 2: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f00000000c0), 0x4) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x10) 17:30:06 executing program 1: getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000300), &(0x7f0000000340)=0xc) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) 17:30:06 executing program 5: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000300)) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:30:06 executing program 3: ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001200)=@assoc_value, &(0x7f0000001240)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x4, &(0x7f0000001280), &(0x7f0000001340)=0x8) 17:30:06 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000002cc0)={0x0, @in={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, &(0x7f0000002dc0)=0x100) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f00000000c0)=""/150, &(0x7f0000000000)=0x96) 17:30:06 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16") r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x5, &(0x7f00000001c0), 0x4) 17:30:06 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) get_robust_list(0x0, &(0x7f0000000140)=&(0x7f0000000080)={&(0x7f0000000040)={&(0x7f0000000000)}}, &(0x7f00000001c0)=0x18) 17:30:06 executing program 7: socket$inet6(0xa, 0x1, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f00000001c0), 0x4) 17:30:06 executing program 1: r0 = socket$inet(0x2, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000300), &(0x7f0000000340)=0xc) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) 17:30:06 executing program 2: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f00000000c0), 0x4) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x10) 17:30:06 executing program 3: ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001200)=@assoc_value, &(0x7f0000001240)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x4, &(0x7f0000001280), &(0x7f0000001340)=0x8) 17:30:07 executing program 5: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000300)) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:30:07 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000002cc0)={0x0, @in={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, &(0x7f0000002dc0)=0x100) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f00000000c0)=""/150, &(0x7f0000000000)=0x96) 17:30:07 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) get_robust_list(0x0, &(0x7f0000000140)=&(0x7f0000000080)={&(0x7f0000000040)={&(0x7f0000000000)}}, &(0x7f00000001c0)=0x18) 17:30:07 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f47767") r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x5, &(0x7f00000001c0), 0x4) 17:30:07 executing program 7: ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f00000001c0), 0x4) 17:30:07 executing program 2: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f47767") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f00000000c0), 0x4) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x10) 17:30:07 executing program 3: ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001200)=@assoc_value, &(0x7f0000001240)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x4, &(0x7f0000001280), &(0x7f0000001340)=0x8) 17:30:07 executing program 1: r0 = socket$inet(0x2, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000300), &(0x7f0000000340)=0xc) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) 17:30:07 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000300)) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:30:07 executing program 0: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000001440), 0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000140)={0x0, @in={{0x2}}}, 0x84) 17:30:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) get_robust_list(0x0, &(0x7f0000000140)=&(0x7f0000000080)={&(0x7f0000000040)={&(0x7f0000000000)}}, &(0x7f00000001c0)=0x18) 17:30:07 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f47767") r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x5, &(0x7f00000001c0), 0x4) 17:30:07 executing program 7: ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f00000001c0), 0x4) 17:30:07 executing program 2: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f47767") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f00000000c0), 0x4) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x10) 17:30:07 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000001200)=@assoc_value, &(0x7f0000001240)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x4, &(0x7f0000001280), &(0x7f0000001340)=0x8) 17:30:07 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000300)) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:30:07 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f47767") r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x5, &(0x7f00000001c0), 0x4) 17:30:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) get_robust_list(0x0, &(0x7f0000000140)=&(0x7f0000000080)={&(0x7f0000000040)={&(0x7f0000000000)}}, &(0x7f00000001c0)=0x18) 17:30:07 executing program 0: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000001440), 0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000140)={0x0, @in={{0x2}}}, 0x84) 17:30:07 executing program 7: ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f00000001c0), 0x4) 17:30:07 executing program 1: r0 = socket$inet(0x2, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000300), &(0x7f0000000340)=0xc) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) 17:30:07 executing program 2: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f47767") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f00000000c0), 0x4) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x10) 17:30:07 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000001200)=@assoc_value, &(0x7f0000001240)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x4, &(0x7f0000001280), &(0x7f0000001340)=0x8) 17:30:07 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000300)) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:30:07 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f4776710") r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x5, &(0x7f00000001c0), 0x4) 17:30:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) get_robust_list(0x0, &(0x7f0000000140)=&(0x7f0000000080)={&(0x7f0000000040)={&(0x7f0000000000)}}, &(0x7f00000001c0)=0x18) 17:30:07 executing program 0: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000001440), 0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000140)={0x0, @in={{0x2}}}, 0x84) 17:30:07 executing program 7: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f00000001c0), 0x4) 17:30:08 executing program 2: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f4776710") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f00000000c0), 0x4) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x10) 17:30:08 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000300), &(0x7f0000000340)=0xc) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) 17:30:08 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50203}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000300)) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:30:08 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f4776710") r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x5, &(0x7f00000001c0), 0x4) 17:30:08 executing program 0: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000001440), 0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000140)={0x0, @in={{0x2}}}, 0x84) 17:30:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) get_robust_list(0x0, &(0x7f0000000140)=&(0x7f0000000080)={&(0x7f0000000040)={&(0x7f0000000000)}}, &(0x7f00000001c0)=0x18) 17:30:08 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000001200)=@assoc_value, &(0x7f0000001240)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x4, &(0x7f0000001280), &(0x7f0000001340)=0x8) 17:30:08 executing program 2: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f4776710") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f00000000c0), 0x4) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x10) 17:30:08 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000300), &(0x7f0000000340)=0xc) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) 17:30:08 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50203}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000300)) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:30:08 executing program 7: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f00000001c0), 0x4) 17:30:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) get_robust_list(0x0, &(0x7f0000000140)=&(0x7f0000000080)={&(0x7f0000000040)={&(0x7f0000000000)}}, &(0x7f00000001c0)=0x18) 17:30:08 executing program 0: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000140)={0x0, @in={{0x2}}}, 0x84) 17:30:08 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f4776710") r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x5, &(0x7f00000001c0), 0x4) 17:30:08 executing program 2: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f4776710") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f00000000c0), 0x4) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x10) 17:30:08 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50203}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000300)) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:30:08 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000300), &(0x7f0000000340)=0xc) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) 17:30:08 executing program 3: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000001200)=@assoc_value, &(0x7f0000001240)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x4, &(0x7f0000001280), &(0x7f0000001340)=0x8) 17:30:08 executing program 7: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f00000001c0), 0x4) 17:30:08 executing program 0: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000140)={0x0, @in={{0x2}}}, 0x84) 17:30:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) get_robust_list(0x0, &(0x7f0000000140)=&(0x7f0000000080)={&(0x7f0000000040)={&(0x7f0000000000)}}, &(0x7f00000001c0)=0x18) 17:30:08 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r1 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x5, &(0x7f00000001c0), 0x4) 17:30:08 executing program 2: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f00000000c0), 0x4) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x10) 17:30:08 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000300)) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:30:08 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000300), &(0x7f0000000340)=0xc) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) 17:30:08 executing program 3: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000001200)=@assoc_value, &(0x7f0000001240)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x4, &(0x7f0000001280), &(0x7f0000001340)=0x8) 17:30:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) get_robust_list(0x0, &(0x7f0000000140)=&(0x7f0000000080)={&(0x7f0000000040)={&(0x7f0000000000)}}, &(0x7f00000001c0)=0x18) 17:30:09 executing program 0: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000140)={0x0, @in={{0x2}}}, 0x84) [ 892.050909] kauditd_printk_skb: 1 callbacks suppressed [ 892.050934] audit: type=1326 audit(1529688609.049:1713): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24986 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:09 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f00000001c0), 0x4) 17:30:09 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r1 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x5, &(0x7f00000001c0), 0x4) 17:30:09 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000300), &(0x7f0000000340)=0xc) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) [ 892.164338] audit: type=1326 audit(1529688609.134:1714): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24995 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:09 executing program 2: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f00000000c0), 0x4) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x10) 17:30:09 executing program 3: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000001200)=@assoc_value, &(0x7f0000001240)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x4, &(0x7f0000001280), &(0x7f0000001340)=0x8) 17:30:09 executing program 0: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000001440), 0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000140)={0x0, @in={{0x2}}}, 0x84) 17:30:09 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f00000001c0), 0x4) 17:30:09 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000300), &(0x7f0000000340)=0xc) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) 17:30:09 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r1 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x5, &(0x7f00000001c0), 0x4) 17:30:09 executing program 2: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f00000000c0), 0x4) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x10) 17:30:09 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f00000001c0), 0x4) 17:30:09 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000300)) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:30:09 executing program 3: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x0, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000001200)=@assoc_value, &(0x7f0000001240)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x4, &(0x7f0000001280), &(0x7f0000001340)=0x8) 17:30:09 executing program 0: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000001440), 0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000140)={0x0, @in={{0x2}}}, 0x84) [ 892.941963] audit: type=1326 audit(1529688609.931:1715): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25054 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:10 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)="295ee1311f16f477671070") r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f00000001c0), 0x4) 17:30:10 executing program 0: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") setsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000001440), 0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000140)={0x0, @in={{0x2}}}, 0x84) 17:30:10 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f00000001c0), &(0x7f0000000200)=0xc) 17:30:10 executing program 2: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000000c0), 0x4) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x10) 17:30:10 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x5, &(0x7f00000001c0), 0x4) 17:30:10 executing program 3: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x0, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000001200)=@assoc_value, &(0x7f0000001240)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x4, &(0x7f0000001280), &(0x7f0000001340)=0x8) 17:30:10 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) get_robust_list(0x0, &(0x7f0000000140)=&(0x7f0000000080)={&(0x7f0000000040)={&(0x7f0000000000)}}, &(0x7f00000001c0)=0x18) 17:30:10 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)="295ee1311f16f477671070") r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f00000001c0), 0x4) 17:30:10 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x5, &(0x7f00000001c0), 0x4) [ 893.112917] audit: type=1326 audit(1529688610.111:1716): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25071 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:10 executing program 3: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x0, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000001200)=@assoc_value, &(0x7f0000001240)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x4, &(0x7f0000001280), &(0x7f0000001340)=0x8) 17:30:10 executing program 0: socket$inet6(0xa, 0x80000000005, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000001440), 0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000140)={0x0, @in={{0x2}}}, 0x84) 17:30:10 executing program 2: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000000c0), 0x4) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x10) 17:30:10 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f00000001c0), &(0x7f0000000200)=0xc) 17:30:10 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000300)) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:30:10 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x5, &(0x7f00000001c0), 0x4) 17:30:10 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)="295ee1311f16f477671070") r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f00000001c0), 0x4) 17:30:10 executing program 3: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000001200)=@assoc_value, &(0x7f0000001240)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x4, &(0x7f0000001280), &(0x7f0000001340)=0x8) [ 893.870466] audit: type=1326 audit(1529688610.869:1717): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25098 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) get_robust_list(0x0, &(0x7f0000000140)=&(0x7f0000000080)={&(0x7f0000000040)={&(0x7f0000000000)}}, &(0x7f00000001c0)=0x18) 17:30:11 executing program 2: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000000c0), 0x4) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x10) 17:30:11 executing program 0: socket$inet6(0xa, 0x80000000005, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000001440), 0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000140)={0x0, @in={{0x2}}}, 0x84) 17:30:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f00000001c0), &(0x7f0000000200)=0xc) 17:30:11 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000001c0), 0x4) 17:30:11 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f00000001c0), 0x4) 17:30:11 executing program 3: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000001200)=@assoc_value, &(0x7f0000001240)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x4, &(0x7f0000001280), &(0x7f0000001340)=0x8) 17:30:11 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f00000001c0), 0x4) [ 894.082623] audit: type=1326 audit(1529688611.081:1718): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25123 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:11 executing program 2: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f00000000c0), 0x4) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x10) 17:30:11 executing program 0: socket$inet6(0xa, 0x80000000005, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000001440), 0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000140)={0x0, @in={{0x2}}}, 0x84) 17:30:11 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000001c0), 0x4) 17:30:11 executing program 3: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000001200)=@assoc_value, &(0x7f0000001240)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x4, &(0x7f0000001280), &(0x7f0000001340)=0x8) 17:30:11 executing program 0: ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000001440), 0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000140)={0x0, @in={{0x2}}}, 0x84) 17:30:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f00000001c0), &(0x7f0000000200)=0xc) 17:30:11 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f00000001c0), 0x4) 17:30:11 executing program 3: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16") r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000001200)=@assoc_value, &(0x7f0000001240)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x4, &(0x7f0000001280), &(0x7f0000001340)=0x8) 17:30:11 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) mmap(&(0x7f0000134000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) mmap(&(0x7f00009a2000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) 17:30:11 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000001c0), 0x4) 17:30:11 executing program 2: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f00000000c0), 0x4) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x10) 17:30:11 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16") r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f00000001c0), 0x4) 17:30:11 executing program 0: ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000001440), 0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000140)={0x0, @in={{0x2}}}, 0x84) 17:30:11 executing program 3: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16") r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000001200)=@assoc_value, &(0x7f0000001240)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x4, &(0x7f0000001280), &(0x7f0000001340)=0x8) 17:30:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000)) 17:30:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f00000001c0), &(0x7f0000000200)=0xc) 17:30:12 executing program 3: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16") r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000001200)=@assoc_value, &(0x7f0000001240)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x4, &(0x7f0000001280), &(0x7f0000001340)=0x8) 17:30:12 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16") r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f00000001c0), 0x4) 17:30:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000001180)) epoll_create1(0x0) 17:30:12 executing program 0: ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000001440), 0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000140)={0x0, @in={{0x2}}}, 0x84) 17:30:12 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) mmap(&(0x7f0000134000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) mmap(&(0x7f00009a2000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) 17:30:12 executing program 2: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f00000000c0), 0x4) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x10) 17:30:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f00000001c0), &(0x7f0000000200)=0xc) 17:30:12 executing program 3: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f47767") r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000001200)=@assoc_value, &(0x7f0000001240)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x4, &(0x7f0000001280), &(0x7f0000001340)=0x8) 17:30:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000)) 17:30:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet(0x2, 0x0, 0x0) ioctl$SG_GET_RESERVED_SIZE(0xffffffffffffffff, 0x2272, &(0x7f00000000c0)) 17:30:12 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000001440), 0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000140)={0x0, @in={{0x2}}}, 0x84) 17:30:12 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16") r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f00000001c0), 0x4) 17:30:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) renameat2(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0) 17:30:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f00000001c0), &(0x7f0000000200)=0xc) 17:30:12 executing program 3: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f47767") r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000001200)=@assoc_value, &(0x7f0000001240)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x4, &(0x7f0000001280), &(0x7f0000001340)=0x8) 17:30:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000001180)) epoll_create1(0x0) 17:30:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000)) 17:30:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) prctl$setptracer(0x59616d61, 0x0) 17:30:12 executing program 3: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f47767") r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000001200)=@assoc_value, &(0x7f0000001240)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x4, &(0x7f0000001280), &(0x7f0000001340)=0x8) 17:30:12 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f47767") r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f00000001c0), 0x4) 17:30:12 executing program 1: syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f00000001c0), &(0x7f0000000200)=0xc) 17:30:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) renameat2(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0) 17:30:12 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000001440), 0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000140)={0x0, @in={{0x2}}}, 0x84) 17:30:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000001180)) epoll_create1(0x0) 17:30:12 executing program 1: syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f00000001c0), &(0x7f0000000200)=0xc) 17:30:13 executing program 3: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f4776710") r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000001200)=@assoc_value, &(0x7f0000001240)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x4, &(0x7f0000001280), &(0x7f0000001340)=0x8) 17:30:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000)) 17:30:13 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f47767") r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f00000001c0), 0x4) 17:30:13 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) accept(0xffffffffffffffff, &(0x7f0000000080)=@pppoe={0x0, 0x0, {0x0, @random}}, &(0x7f0000000000)=0x80) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000200), &(0x7f0000000240)=0x4) 17:30:13 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000001180)) epoll_create1(0x0) 17:30:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) renameat2(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0) 17:30:13 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000001440), 0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000140)={0x0, @in={{0x2}}}, 0x84) 17:30:13 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f47767") r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f00000001c0), 0x4) 17:30:13 executing program 3: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f4776710") r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000001200)=@assoc_value, &(0x7f0000001240)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x4, &(0x7f0000001280), &(0x7f0000001340)=0x8) 17:30:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000)) 17:30:13 executing program 1: syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f00000001c0), &(0x7f0000000200)=0xc) 17:30:13 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) epoll_create1(0x0) 17:30:13 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) accept(0xffffffffffffffff, &(0x7f0000000080)=@pppoe={0x0, 0x0, {0x0, @random}}, &(0x7f0000000000)=0x80) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000200), &(0x7f0000000240)=0x4) 17:30:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) renameat2(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0) 17:30:13 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f4776710") r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f00000001c0), 0x4) 17:30:13 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f00000001c0), &(0x7f0000000200)=0xc) 17:30:13 executing program 3: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f4776710") r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000001200)=@assoc_value, &(0x7f0000001240)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x4, &(0x7f0000001280), &(0x7f0000001340)=0x8) 17:30:13 executing program 0: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000001440), 0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000140)={0x0, @in={{0x2}}}, 0x84) 17:30:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000)) 17:30:13 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) epoll_create1(0x0) 17:30:13 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f00000001c0), &(0x7f0000000200)=0xc) 17:30:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) renameat2(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0) 17:30:13 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) accept(0xffffffffffffffff, &(0x7f0000000080)=@pppoe={0x0, 0x0, {0x0, @random}}, &(0x7f0000000000)=0x80) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000200), &(0x7f0000000240)=0x4) 17:30:13 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f4776710") r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f00000001c0), 0x4) 17:30:13 executing program 3: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x0, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000001200)=@assoc_value, &(0x7f0000001240)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x4, &(0x7f0000001280), &(0x7f0000001340)=0x8) 17:30:13 executing program 0: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000001440), 0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000140)={0x0, @in={{0x2}}}, 0x84) 17:30:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000)) 17:30:14 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) epoll_create1(0x0) 17:30:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) renameat2(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0) 17:30:14 executing program 0: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000001440), 0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000140)={0x0, @in={{0x2}}}, 0x84) 17:30:14 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f00000001c0), &(0x7f0000000200)=0xc) 17:30:14 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f4776710") r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f00000001c0), 0x4) 17:30:14 executing program 6: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000)) 17:30:14 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) accept(0xffffffffffffffff, &(0x7f0000000080)=@pppoe={0x0, 0x0, {0x0, @random}}, &(0x7f0000000000)=0x80) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000200), &(0x7f0000000240)=0x4) 17:30:14 executing program 3: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001200)=@assoc_value, &(0x7f0000001240)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x4, &(0x7f0000001280), &(0x7f0000001340)=0x8) 17:30:14 executing program 4: stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000001180)) epoll_create1(0x0) 17:30:14 executing program 0: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x0, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000001440), 0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000140)={0x0, @in={{0x2}}}, 0x84) 17:30:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000080)}) syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f00000001c0), &(0x7f0000000200)=0xc) 17:30:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) renameat2(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0) 17:30:14 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r1 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f00000001c0), 0x4) 17:30:14 executing program 6: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000)) 17:30:14 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000200), &(0x7f0000000240)=0x4) 17:30:14 executing program 3: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001200)=@assoc_value, &(0x7f0000001240)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x4, &(0x7f0000001280), &(0x7f0000001340)=0x8) 17:30:14 executing program 4: stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000001180)) epoll_create1(0x0) 17:30:14 executing program 6: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000)) 17:30:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000080)}) syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f00000001c0), &(0x7f0000000200)=0xc) 17:30:14 executing program 0: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x0, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000001440), 0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000140)={0x0, @in={{0x2}}}, 0x84) 17:30:14 executing program 2: getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) renameat2(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0) 17:30:14 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r1 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f00000001c0), 0x4) 17:30:14 executing program 4: stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000001180)) epoll_create1(0x0) 17:30:14 executing program 3: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001200)=@assoc_value, &(0x7f0000001240)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x4, &(0x7f0000001280), &(0x7f0000001340)=0x8) 17:30:14 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000200), &(0x7f0000000240)=0x4) 17:30:14 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000)) 17:30:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000080)}) syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f00000001c0), &(0x7f0000000200)=0xc) 17:30:14 executing program 0: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x0, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000001440), 0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000140)={0x0, @in={{0x2}}}, 0x84) 17:30:15 executing program 2: getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) renameat2(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0) 17:30:15 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000001180)) epoll_create1(0x0) 17:30:15 executing program 3: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000001200)=@assoc_value, &(0x7f0000001240)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000001280), &(0x7f0000001340)=0x8) 17:30:15 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r1 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f00000001c0), 0x4) 17:30:15 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000)) 17:30:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x50012}]}) syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f00000001c0), &(0x7f0000000200)=0xc) 17:30:15 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000200), &(0x7f0000000240)=0x4) 17:30:15 executing program 0: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000001440), 0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000140)={0x0, @in={{0x2}}}, 0x84) 17:30:15 executing program 2: getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) renameat2(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0) 17:30:15 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) pipe2(&(0x7f0000000380), 0x0) keyctl$update(0x2, 0x0, &(0x7f0000000240), 0x0) 17:30:15 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000001180)) epoll_create1(0x0) 17:30:15 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000)) 17:30:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x50012}]}) syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f00000001c0), &(0x7f0000000200)=0xc) 17:30:15 executing program 0: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000001440), 0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000140)={0x0, @in={{0x2}}}, 0x84) 17:30:15 executing program 5: accept(0xffffffffffffffff, &(0x7f0000000080)=@pppoe={0x0, 0x0, {0x0, @random}}, &(0x7f0000000000)=0x80) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000200), &(0x7f0000000240)=0x4) 17:30:15 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) renameat2(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0) 17:30:15 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f00000001c0), 0x4) 17:30:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x50012}]}) syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f00000001c0), &(0x7f0000000200)=0xc) 17:30:15 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000001180)) epoll_create1(0x0) 17:30:15 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000)) 17:30:15 executing program 0: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000001440), 0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000140)={0x0, @in={{0x2}}}, 0x84) 17:30:15 executing program 5: accept(0xffffffffffffffff, &(0x7f0000000080)=@pppoe={0x0, 0x0, {0x0, @random}}, &(0x7f0000000000)=0x80) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000200), &(0x7f0000000240)=0x4) 17:30:15 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) pipe2(&(0x7f0000000380), 0x0) keyctl$update(0x2, 0x0, &(0x7f0000000240), 0x0) 17:30:15 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) renameat2(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0) 17:30:15 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f00000001c0), 0x4) 17:30:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f00000001c0), &(0x7f0000000200)=0xc) 17:30:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000)) 17:30:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000001180)) epoll_create1(0x0) 17:30:16 executing program 5: accept(0xffffffffffffffff, &(0x7f0000000080)=@pppoe={0x0, 0x0, {0x0, @random}}, &(0x7f0000000000)=0x80) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000200), &(0x7f0000000240)=0x4) 17:30:16 executing program 0: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000001440), 0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000140)={0x0, @in={{0x2}}}, 0x84) [ 899.008437] audit: type=1326 audit(1529688616.007:1719): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25519 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:16 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f00000001c0), 0x4) 17:30:16 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) renameat2(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0) 17:30:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) pipe2(&(0x7f0000000380), 0x0) keyctl$update(0x2, 0x0, &(0x7f0000000240), 0x0) 17:30:16 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) accept(0xffffffffffffffff, &(0x7f0000000080)=@pppoe={0x0, 0x0, {0x0, @random}}, &(0x7f0000000000)=0x80) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000200), &(0x7f0000000240)=0x4) 17:30:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000)) 17:30:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000001180)) epoll_create1(0x0) 17:30:16 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f00000001c0), 0x4) 17:30:16 executing program 0: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000001440), 0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000140)={0x0, @in={{0x2}}}, 0x84) 17:30:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) renameat2(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0) 17:30:16 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) accept(0xffffffffffffffff, &(0x7f0000000080)=@pppoe={0x0, 0x0, {0x0, @random}}, &(0x7f0000000000)=0x80) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000200), &(0x7f0000000240)=0x4) 17:30:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) pipe2(&(0x7f0000000380), 0x0) keyctl$update(0x2, 0x0, &(0x7f0000000240), 0x0) 17:30:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f00000001c0), &(0x7f0000000200)=0xc) 17:30:16 executing program 0: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000001440), 0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000140)={0x0, @in={{0x2}}}, 0x84) 17:30:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000)) 17:30:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) renameat2(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0) 17:30:16 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f00000001c0), 0x4) 17:30:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000001180)) epoll_create1(0x0) 17:30:16 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) accept(0xffffffffffffffff, &(0x7f0000000080)=@pppoe={0x0, 0x0, {0x0, @random}}, &(0x7f0000000000)=0x80) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000200), &(0x7f0000000240)=0x4) 17:30:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) keyctl$update(0x2, 0x0, &(0x7f0000000240), 0x0) [ 899.950589] audit: type=1326 audit(1529688616.949:1720): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25575 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:17 executing program 0: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f47767") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000001440), 0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000140)={0x0, @in={{0x2}}}, 0x84) 17:30:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) renameat2(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0) 17:30:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000001180)) epoll_create1(0x0) 17:30:17 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) accept(0xffffffffffffffff, &(0x7f0000000080)=@pppoe={0x0, 0x0, {0x0, @random}}, &(0x7f0000000000)=0x80) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000200), &(0x7f0000000240)=0x4) 17:30:17 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) keyctl$update(0x2, 0x0, &(0x7f0000000240), 0x0) 17:30:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000)) 17:30:17 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x98) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f00000001c0), 0x4) 17:30:17 executing program 0: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f47767") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000001440), 0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000140)={0x0, @in={{0x2}}}, 0x84) 17:30:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) renameat2(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0) 17:30:17 executing program 0: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f47767") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000001440), 0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000140)={0x0, @in={{0x2}}}, 0x84) 17:30:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000001180)) epoll_create1(0x0) 17:30:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f00000001c0), &(0x7f0000000200)=0xc) 17:30:17 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) pipe(&(0x7f0000000000)) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) 17:30:17 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) accept(0xffffffffffffffff, &(0x7f0000000080)=@pppoe={0x0, 0x0, {0x0, @random}}, &(0x7f0000000000)=0x80) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000200), &(0x7f0000000240)=0x4) 17:30:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000)) 17:30:17 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) keyctl$update(0x2, 0x0, &(0x7f0000000240), 0x0) [ 900.939473] audit: type=1326 audit(1529688617.938:1721): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25625 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:18 executing program 3: pipe2(&(0x7f0000000380), 0x0) keyctl$update(0x2, 0x0, &(0x7f0000000240), 0x0) 17:30:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) accept(0xffffffffffffffff, &(0x7f0000000080)=@pppoe={0x0, 0x0, {0x0, @random}}, &(0x7f0000000000)=0x80) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000200), &(0x7f0000000240)=0x4) 17:30:18 executing program 0: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f4776710") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000001440), 0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000140)={0x0, @in={{0x2}}}, 0x84) 17:30:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000)) 17:30:18 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000001180)) epoll_create1(0x0) 17:30:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) renameat2(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0) [ 901.165915] audit: type=1326 audit(1529688618.164:1722): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25654 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:18 executing program 3: pipe2(&(0x7f0000000380), 0x0) keyctl$update(0x2, 0x0, &(0x7f0000000240), 0x0) 17:30:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) accept(0xffffffffffffffff, &(0x7f0000000080)=@pppoe={0x0, 0x0, {0x0, @random}}, &(0x7f0000000000)=0x80) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000200), &(0x7f0000000240)=0x4) 17:30:18 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) pipe(&(0x7f0000000000)) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) 17:30:18 executing program 0: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f4776710") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000001440), 0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000140)={0x0, @in={{0x2}}}, 0x84) 17:30:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) renameat2(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0) 17:30:18 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000001180)) epoll_create1(0x0) 17:30:18 executing program 3: pipe2(&(0x7f0000000380), 0x0) keyctl$update(0x2, 0x0, &(0x7f0000000240), 0x0) 17:30:18 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) pipe(&(0x7f0000000000)) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) 17:30:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) accept(0xffffffffffffffff, &(0x7f0000000080)=@pppoe={0x0, 0x0, {0x0, @random}}, &(0x7f0000000000)=0x80) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000200), &(0x7f0000000240)=0x4) 17:30:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000240)) [ 901.810059] audit: type=1326 audit(1529688618.808:1723): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25675 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) renameat2(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0) 17:30:18 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) pipe2(&(0x7f0000000380), 0x0) keyctl$update(0x2, 0x0, &(0x7f0000000240), 0x0) 17:30:18 executing program 0: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f4776710") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000001440), 0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000140)={0x0, @in={{0x2}}}, 0x84) [ 902.034273] audit: type=1326 audit(1529688619.033:1724): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25697 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:19 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000)) 17:30:19 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) accept(0xffffffffffffffff, &(0x7f0000000080)=@pppoe={0x0, 0x0, {0x0, @random}}, &(0x7f0000000000)=0x80) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000200), &(0x7f0000000240)=0x4) 17:30:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000240)) 17:30:19 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) pipe(&(0x7f0000000000)) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) 17:30:19 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) pipe2(&(0x7f0000000380), 0x0) keyctl$update(0x2, 0x0, &(0x7f0000000240), 0x0) 17:30:19 executing program 0: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000001440), 0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000140)={0x0, @in={{0x2}}}, 0x84) [ 902.241250] audit: type=1326 audit(1529688619.239:1725): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25711 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:19 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) accept(0xffffffffffffffff, &(0x7f0000000080)=@pppoe={0x0, 0x0, {0x0, @random}}, &(0x7f0000000000)=0x80) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000200), &(0x7f0000000240)=0x4) 17:30:19 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) [ 902.385579] audit: type=1326 audit(1529688619.384:1726): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25720 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:19 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000001180)) epoll_create1(0x0) 17:30:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000240)) 17:30:19 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) pipe2(&(0x7f0000000380), 0x0) keyctl$update(0x2, 0x0, &(0x7f0000000240), 0x0) 17:30:19 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) 17:30:19 executing program 0: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000001440), 0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000140)={0x0, @in={{0x2}}}, 0x84) [ 902.858289] audit: type=1326 audit(1529688619.854:1727): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25743 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) renameat2(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0) 17:30:19 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) pipe2(&(0x7f0000000380), 0x0) keyctl$update(0x2, 0x0, &(0x7f0000000240), 0x0) 17:30:19 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) [ 903.079728] audit: type=1326 audit(1529688620.078:1728): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25756 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:20 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000)) 17:30:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000240)) 17:30:20 executing program 0: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000001440), 0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000140)={0x0, @in={{0x2}}}, 0x84) 17:30:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) pipe2(&(0x7f0000000380), 0x0) keyctl$update(0x2, 0x0, &(0x7f0000000240), 0x0) 17:30:20 executing program 7: pipe(&(0x7f0000000000)) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) 17:30:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) pipe2(&(0x7f0000000380), 0x0) keyctl$update(0x2, 0x0, &(0x7f0000000240), 0x0) 17:30:20 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) accept(0xffffffffffffffff, &(0x7f0000000080)=@pppoe={0x0, 0x0, {0x0, @random}}, &(0x7f0000000000)=0x80) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000200), &(0x7f0000000240)=0x4) 17:30:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000240)) 17:30:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000001180)) epoll_create1(0x0) 17:30:20 executing program 7: pipe(&(0x7f0000000000)) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) 17:30:20 executing program 0: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000001440), 0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000140)={0x0, @in={{0x2}}}, 0x84) 17:30:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) pipe2(&(0x7f0000000380), 0x0) keyctl$update(0x2, 0x0, &(0x7f0000000240), 0x0) 17:30:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000240)) 17:30:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) renameat2(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0) 17:30:21 executing program 7: pipe(&(0x7f0000000000)) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) 17:30:21 executing program 0: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000001440), 0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000140)={0x0, @in={{0x2}}}, 0x84) 17:30:21 executing program 7: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) pipe(&(0x7f0000000000)) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) 17:30:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) pipe2(&(0x7f0000000380), 0x0) keyctl$update(0x2, 0x0, &(0x7f0000000240), 0x0) 17:30:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000240)) 17:30:21 executing program 0: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000001440), 0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000140)={0x0, @in={{0x2}}}, 0x84) 17:30:21 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000180)) [ 904.084236] kauditd_printk_skb: 3 callbacks suppressed [ 904.084259] audit: type=1326 audit(1529688621.083:1732): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25810 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:21 executing program 7: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) pipe(&(0x7f0000000000)) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) 17:30:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) accept(0xffffffffffffffff, &(0x7f0000000080)=@pppoe={0x0, 0x0, {0x0, @random}}, &(0x7f0000000000)=0x80) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000200), &(0x7f0000000240)=0x4) 17:30:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) pipe2(&(0x7f0000000380), 0x0) keyctl$update(0x2, 0x0, &(0x7f0000000240), 0x0) [ 904.494713] audit: type=1326 audit(1529688621.493:1733): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25836 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) pipe2(&(0x7f0000000380), 0x0) keyctl$update(0x2, 0x0, &(0x7f0000000240), 0x0) 17:30:21 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000240)) 17:30:21 executing program 0: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000001440), 0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000140)={0x0, @in={{0x2}}}, 0x84) 17:30:21 executing program 7: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) pipe(&(0x7f0000000000)) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) 17:30:21 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000180)) [ 904.836834] audit: type=1326 audit(1529688621.835:1734): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25847 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000180)) 17:30:22 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}) pipe(&(0x7f0000000000)) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) 17:30:22 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000240)) 17:30:22 executing program 0: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000001440), 0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000140)={0x0, @in={{0x2}}}, 0x84) 17:30:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, &(0x7f0000000280)) 17:30:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000200)=""/98, 0x62) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) 17:30:22 executing program 0: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000001440), 0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000140)={0x0, @in={{0x2}}}, 0x84) 17:30:22 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}) pipe(&(0x7f0000000000)) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) 17:30:22 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000240)) 17:30:22 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000240)) 17:30:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, &(0x7f0000000280)) 17:30:22 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) mq_open(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0, &(0x7f00000001c0)) 17:30:22 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000240)) 17:30:22 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}) pipe(&(0x7f0000000000)) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) 17:30:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000180)) 17:30:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f00000001c0)=""/233) 17:30:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) pipe2(&(0x7f0000000380), 0x0) keyctl$update(0x2, 0x0, &(0x7f0000000240), 0x0) 17:30:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, &(0x7f0000000280)) 17:30:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000200)=""/98, 0x62) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) 17:30:22 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50203}]}) pipe(&(0x7f0000000000)) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) 17:30:22 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000240)) [ 905.845767] audit: type=1326 audit(1529688622.844:1735): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25910 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000200)=""/98, 0x62) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) 17:30:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, &(0x7f0000000280)) 17:30:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) fstat(0xffffffffffffffff, &(0x7f0000000180)) 17:30:23 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) mq_open(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0, &(0x7f00000001c0)) 17:30:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) lsetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)=@known='system.advise\x00', &(0x7f0000000200)='\x00', 0x1, 0x0) 17:30:23 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50203}]}) pipe(&(0x7f0000000000)) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) 17:30:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000240)) 17:30:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) pipe2(&(0x7f0000000380), 0x0) keyctl$update(0x2, 0x0, &(0x7f0000000240), 0x0) 17:30:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000200)=""/98, 0x62) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) 17:30:23 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, &(0x7f0000000280)) 17:30:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) fstat(0xffffffffffffffff, &(0x7f0000000180)) 17:30:23 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) mq_open(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0, &(0x7f00000001c0)) 17:30:23 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50203}]}) pipe(&(0x7f0000000000)) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) 17:30:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) lsetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)=@known='system.advise\x00', &(0x7f0000000200)='\x00', 0x1, 0x0) 17:30:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000240)) [ 906.815731] audit: type=1326 audit(1529688623.814:1736): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25964 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000240)) 17:30:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) fstat(0xffffffffffffffff, &(0x7f0000000180)) 17:30:23 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6}]}) pipe(&(0x7f0000000000)) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) 17:30:23 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, &(0x7f0000000280)) 17:30:23 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) mq_open(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0, &(0x7f00000001c0)) 17:30:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) lsetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)=@known='system.advise\x00', &(0x7f0000000200)='\x00', 0x1, 0x0) 17:30:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) [ 907.069800] audit: type=1326 audit(1529688624.068:1737): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25975 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:24 executing program 6: open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000180)) 17:30:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) lsetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)=@known='system.advise\x00', &(0x7f0000000200)='\x00', 0x1, 0x0) 17:30:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000240)) 17:30:24 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, &(0x7f0000000280)) 17:30:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) mq_open(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0, &(0x7f00000001c0)) 17:30:24 executing program 6: open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000180)) 17:30:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) 17:30:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000000)) 17:30:24 executing program 6: open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000180)) 17:30:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000240)) 17:30:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) 17:30:25 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6}]}) pipe(&(0x7f0000000000)) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) 17:30:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) mq_open(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0, &(0x7f00000001c0)) 17:30:25 executing program 4: memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, &(0x7f0000000280)) 17:30:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) lsetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)=@known='system.advise\x00', &(0x7f0000000200)='\x00', 0x1, 0x0) 17:30:25 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000180)) 17:30:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000000)) 17:30:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000240)) 17:30:25 executing program 2: listxattr(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000200)=""/98, 0x62) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) [ 908.163546] audit: type=1326 audit(1529688625.162:1738): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26036 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) lsetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)=@known='system.advise\x00', &(0x7f0000000200)='\x00', 0x1, 0x0) 17:30:25 executing program 4: memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, &(0x7f0000000280)) 17:30:25 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000180)) 17:30:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) mq_open(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0, &(0x7f00000001c0)) 17:30:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000240)) 17:30:25 executing program 2: listxattr(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000200)=""/98, 0x62) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) 17:30:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000000)) [ 908.442753] audit: type=1326 audit(1529688625.440:1739): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26060 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:25 executing program 4: memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, &(0x7f0000000280)) 17:30:26 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6}]}) pipe(&(0x7f0000000000)) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) 17:30:26 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000180)) 17:30:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) lsetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)=@known='system.advise\x00', &(0x7f0000000200)='\x00', 0x1, 0x0) 17:30:26 executing program 0: listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) mq_open(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0, &(0x7f00000001c0)) 17:30:26 executing program 2: listxattr(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000200)=""/98, 0x62) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) 17:30:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000000)) 17:30:26 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, &(0x7f0000000280)) 17:30:26 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, &(0x7f0000000280)) [ 909.112640] audit: type=1326 audit(1529688626.111:1740): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26091 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:26 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000200)=""/98, 0x62) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) 17:30:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000180)) 17:30:26 executing program 0: listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) mq_open(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0, &(0x7f00000001c0)) 17:30:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000000)) 17:30:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000240)) 17:30:26 executing program 5: openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) lsetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)=@known='system.advise\x00', &(0x7f0000000200)='\x00', 0x1, 0x0) 17:30:26 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, &(0x7f0000000280)) 17:30:26 executing program 0: listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) mq_open(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0, &(0x7f00000001c0)) [ 909.471426] audit: type=1326 audit(1529688626.470:1741): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26115 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:27 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) mq_open(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0, &(0x7f00000001c0)) 17:30:27 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000200)=""/98, 0x62) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) 17:30:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000180)) 17:30:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000000)) 17:30:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, &(0x7f0000000280)) 17:30:27 executing program 5: openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) lsetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)=@known='system.advise\x00', &(0x7f0000000200)='\x00', 0x1, 0x0) 17:30:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) socket$unix(0x1, 0x0, 0x0) 17:30:27 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) mq_open(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0, &(0x7f00000001c0)) 17:30:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000180)) 17:30:27 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000200)=""/98, 0x62) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) 17:30:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, &(0x7f0000000280)) 17:30:27 executing program 5: openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) lsetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)=@known='system.advise\x00', &(0x7f0000000200)='\x00', 0x1, 0x0) 17:30:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000240)) 17:30:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000000)) 17:30:27 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) mq_open(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0, &(0x7f00000001c0)) 17:30:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) socket$unix(0x1, 0x0, 0x0) 17:30:27 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) lsetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)=@known='system.advise\x00', &(0x7f0000000200)='\x00', 0x1, 0x0) 17:30:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020d}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000180)) 17:30:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) listxattr(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000200)=""/98, 0x62) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) 17:30:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, &(0x7f0000000280)) [ 910.561799] audit: type=1326 audit(1529688627.560:1742): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26165 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) mq_open(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0, &(0x7f00000001c0)) 17:30:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020d}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000180)) 17:30:27 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) lsetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)=@known='system.advise\x00', &(0x7f0000000200)='\x00', 0x1, 0x0) 17:30:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) listxattr(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000200)=""/98, 0x62) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) 17:30:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, &(0x7f0000000280)) 17:30:27 executing program 3: socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000000)) 17:30:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) socket$unix(0x1, 0x0, 0x0) 17:30:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) mq_open(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0, &(0x7f00000001c0)) 17:30:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) socket$unix(0x1, 0x0, 0x0) 17:30:28 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020d}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000180)) 17:30:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) listxattr(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000200)=""/98, 0x62) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) 17:30:28 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) lsetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)=@known='system.advise\x00', &(0x7f0000000200)='\x00', 0x1, 0x0) 17:30:28 executing program 3: socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000000)) 17:30:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, &(0x7f0000000280)) 17:30:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) mq_open(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0, &(0x7f00000001c0)) 17:30:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) 17:30:28 executing program 3: socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000000)) 17:30:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) mq_open(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0, &(0x7f00000001c0)) 17:30:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, &(0x7f0000000280)) 17:30:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) lsetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)=@known='system.advise\x00', &(0x7f0000000200)='\x00', 0x1, 0x0) 17:30:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000200)=""/98, 0x62) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) 17:30:28 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000180)) 17:30:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) socket$unix(0x1, 0x0, 0x0) 17:30:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) [ 911.785756] audit: type=1326 audit(1529688628.784:1743): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26248 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) mq_open(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0, &(0x7f00000001c0)) 17:30:28 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000000)) 17:30:29 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, &(0x7f0000000280)) 17:30:29 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000200)=""/98, 0x62) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) [ 912.083821] audit: type=1326 audit(1529688629.082:1744): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26268 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:29 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000200)=""/98, 0x62) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) 17:30:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) socket$unix(0x1, 0x0, 0x0) 17:30:29 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000000)) 17:30:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) mq_open(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0, &(0x7f00000001c0)) 17:30:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) lsetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)=@known='system.advise\x00', &(0x7f0000000200)='\x00', 0x1, 0x0) 17:30:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) 17:30:29 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) listxattr(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000200)=""/98, 0x62) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) 17:30:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) mq_open(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0, &(0x7f00000001c0)) 17:30:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) lsetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)=@known='system.advise\x00', &(0x7f0000000200)='\x00', 0x1, 0x0) [ 912.558235] audit: type=1326 audit(1529688629.557:1745): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26291 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 912.632500] audit: type=1326 audit(1529688629.591:1746): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26293 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000180)) 17:30:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) lsetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)=@known='system.advise\x00', &(0x7f0000000200)='\x00', 0x1, 0x0) 17:30:29 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000000)) 17:30:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) socket$unix(0x1, 0x0, 0x0) 17:30:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) [ 912.734376] audit: type=1326 audit(1529688629.732:1747): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26304 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, &(0x7f0000000280)) 17:30:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) lsetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)=@known='system.advise\x00', &(0x7f0000000200)='\x00', 0x1, 0x0) 17:30:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000000)) 17:30:30 executing program 7: openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) socket$unix(0x1, 0x0, 0x0) 17:30:30 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) 17:30:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) lsetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)=@known='system.advise\x00', &(0x7f0000000200)='\x00', 0x1, 0x0) [ 913.126801] audit: type=1326 audit(1529688630.124:1748): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26327 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:30 executing program 7: openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) socket$unix(0x1, 0x0, 0x0) 17:30:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000000)) 17:30:30 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) listxattr(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000200)=""/98, 0x62) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) 17:30:30 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) mq_open(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0, &(0x7f00000001c0)) 17:30:30 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) [ 913.499485] audit: type=1326 audit(1529688630.498:1749): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26345 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:30 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000180)) 17:30:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000000)) 17:30:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) lsetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)=@known='system.advise\x00', &(0x7f0000000200)='\x00', 0x1, 0x0) 17:30:30 executing program 7: openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) socket$unix(0x1, 0x0, 0x0) 17:30:30 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) 17:30:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, &(0x7f0000000280)) 17:30:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000000)) 17:30:31 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) socket$unix(0x1, 0x0, 0x0) 17:30:31 executing program 1: openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) 17:30:31 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) socket$unix(0x1, 0x0, 0x0) 17:30:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000000)) 17:30:31 executing program 1: openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) 17:30:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000000)) 17:30:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) listxattr(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000200)=""/98, 0x62) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) [ 914.428855] kauditd_printk_skb: 4 callbacks suppressed [ 914.428880] audit: type=1326 audit(1529688631.427:1754): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26396 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:31 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) mq_open(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0, &(0x7f00000001c0)) 17:30:31 executing program 1: openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) [ 914.520494] audit: type=1326 audit(1529688631.519:1755): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26402 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000000)) 17:30:31 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) socket$unix(0x1, 0x0, 0x0) 17:30:31 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) 17:30:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) lsetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)=@known='system.advise\x00', &(0x7f0000000200)='\x00', 0x1, 0x0) 17:30:31 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_xfrm(0x10, 0x3, 0x6) [ 914.685306] audit: type=1326 audit(1529688631.684:1756): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26407 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 914.741617] audit: type=1326 audit(1529688631.713:1757): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26410 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:31 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_xfrm(0x10, 0x3, 0x6) 17:30:31 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) 17:30:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) socket$unix(0x1, 0x0, 0x0) 17:30:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@mcast2={0xff, 0x2, [], 0x1}, @in6=@dev={0xfe, 0x80}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0xe8) 17:30:32 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) 17:30:32 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) socket$unix(0x1, 0x0, 0x0) 17:30:32 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) socket$unix(0x1, 0x0, 0x0) 17:30:32 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_xfrm(0x10, 0x3, 0x6) 17:30:32 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) socket$unix(0x1, 0x0, 0x0) 17:30:32 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) socket$unix(0x1, 0x0, 0x0) 17:30:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) 17:30:32 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000000)) 17:30:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@mcast2={0xff, 0x2, [], 0x1}, @in6=@dev={0xfe, 0x80}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0xe8) 17:30:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000000)=""/40) 17:30:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) lsetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)=@known='system.advise\x00', &(0x7f0000000200)='\x00', 0x1, 0x0) 17:30:32 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_xfrm(0x10, 0x3, 0x6) 17:30:32 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) 17:30:32 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) socket$unix(0x1, 0x0, 0x0) 17:30:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) [ 915.625522] audit: type=1326 audit(1529688632.623:1758): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26462 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 915.726589] audit: type=1326 audit(1529688632.725:1759): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26474 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@mcast2={0xff, 0x2, [], 0x1}, @in6=@dev={0xfe, 0x80}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0xe8) 17:30:32 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) socket$unix(0x1, 0x0, 0x0) 17:30:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) 17:30:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000000)=""/40) 17:30:32 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_xfrm(0x10, 0x3, 0x6) [ 915.898824] audit: type=1326 audit(1529688632.897:1760): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26487 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:32 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) 17:30:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) 17:30:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@mcast2={0xff, 0x2, [], 0x1}, @in6=@dev={0xfe, 0x80}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0xe8) 17:30:33 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000000)) 17:30:33 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_xfrm(0x10, 0x3, 0x6) 17:30:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000000)=""/40) [ 916.564593] audit: type=1326 audit(1529688633.563:1761): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26516 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:33 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_xfrm(0x10, 0x3, 0x6) 17:30:33 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) 17:30:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) 17:30:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@mcast2={0xff, 0x2, [], 0x1}, @in6=@dev={0xfe, 0x80}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0xe8) 17:30:33 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) accept$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000900)=0x14) fanotify_init(0x0, 0x0) 17:30:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000000)=""/40) 17:30:33 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) socket$unix(0x1, 0x0, 0x0) 17:30:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) 17:30:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@mcast2={0xff, 0x2, [], 0x1}, @in6=@dev={0xfe, 0x80}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0xe8) 17:30:33 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) 17:30:33 executing program 6: socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_xfrm(0x10, 0x3, 0x6) 17:30:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000000)=""/40) 17:30:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00') [ 916.973297] audit: type=1326 audit(1529688633.971:1762): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26540 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00') 17:30:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) 17:30:34 executing program 6: socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_xfrm(0x10, 0x3, 0x6) 17:30:34 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@mcast2={0xff, 0x2, [], 0x1}, @in6=@dev={0xfe, 0x80}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0xe8) 17:30:34 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000000)=""/40) 17:30:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) 17:30:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00'}, 0x10) [ 917.544614] audit: type=1326 audit(1529688634.543:1763): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26572 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) 17:30:34 executing program 6: socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_xfrm(0x10, 0x3, 0x6) 17:30:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00') 17:30:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) socket$unix(0x1, 0x0, 0x0) 17:30:34 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000000)=""/40) 17:30:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00'}, 0x10) 17:30:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) 17:30:34 executing program 4: socket$inet6(0xa, 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@mcast2={0xff, 0x2, [], 0x1}, @in6=@dev={0xfe, 0x80}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0xe8) 17:30:34 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_xfrm(0x10, 0x3, 0x6) 17:30:34 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_xfrm(0x10, 0x3, 0x6) 17:30:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) 17:30:35 executing program 0: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) 17:30:35 executing program 2: memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000000)=""/40) 17:30:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00') 17:30:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00'}, 0x10) 17:30:35 executing program 4: socket$inet6(0xa, 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@mcast2={0xff, 0x2, [], 0x1}, @in6=@dev={0xfe, 0x80}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0xe8) 17:30:35 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_xfrm(0x10, 0x3, 0x6) 17:30:35 executing program 2: memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000000)=""/40) 17:30:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_xfrm(0x10, 0x3, 0x6) 17:30:35 executing program 4: socket$inet6(0xa, 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@mcast2={0xff, 0x2, [], 0x1}, @in6=@dev={0xfe, 0x80}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0xe8) 17:30:35 executing program 0: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) 17:30:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00'}, 0x10) 17:30:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_xfrm(0x10, 0x3, 0x6) 17:30:35 executing program 2: memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000000)=""/40) 17:30:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00') 17:30:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) 17:30:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) 17:30:36 executing program 0: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) 17:30:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00'}, 0x10) 17:30:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_xfrm(0x10, 0x3, 0x6) 17:30:36 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000000)=""/40) 17:30:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00') 17:30:36 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@mcast2={0xff, 0x2, [], 0x1}, @in6=@dev={0xfe, 0x80}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0xe8) 17:30:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) [ 919.443954] kauditd_printk_skb: 2 callbacks suppressed [ 919.449645] audit: type=1326 audit(1529688636.442:1766): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26680 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:36 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000000)=""/40) 17:30:36 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) 17:30:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_xfrm(0x10, 0x3, 0x6) 17:30:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00'}, 0x10) 17:30:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) 17:30:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00') 17:30:36 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@mcast2={0xff, 0x2, [], 0x1}, @in6=@dev={0xfe, 0x80}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0xe8) 17:30:36 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000000)=""/40) 17:30:37 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00'}, 0x10) 17:30:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_xfrm(0x10, 0x3, 0x6) 17:30:37 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) 17:30:37 executing program 5: listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00') 17:30:37 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@mcast2={0xff, 0x2, [], 0x1}, @in6=@dev={0xfe, 0x80}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0xe8) 17:30:37 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) 17:30:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000000)=""/40) 17:30:37 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) accept$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000900)=0x14) open(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) 17:30:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000000)=""/40) 17:30:37 executing program 5: listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00') 17:30:37 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) accept$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000900)=0x14) open(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) 17:30:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_xfrm(0x10, 0x3, 0x6) 17:30:37 executing program 3: openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00'}, 0x10) 17:30:37 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) 17:30:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@mcast2={0xff, 0x2, [], 0x1}, @in6=@dev={0xfe, 0x80}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0xe8) 17:30:37 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) 17:30:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000000)=""/40) 17:30:37 executing program 3: openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00'}, 0x10) 17:30:37 executing program 5: listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00') 17:30:37 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) 17:30:37 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) accept$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000900)=0x14) open(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) 17:30:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_xfrm(0x10, 0x3, 0x6) 17:30:37 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) 17:30:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000000)=""/40) 17:30:38 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@mcast2={0xff, 0x2, [], 0x1}, @in6=@dev={0xfe, 0x80}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0xe8) 17:30:38 executing program 3: openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00'}, 0x10) [ 920.999312] audit: type=1326 audit(1529688637.998:1767): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26790 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:38 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00') 17:30:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) 17:30:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000000)=""/40) 17:30:38 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00'}, 0x10) 17:30:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) 17:30:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) accept$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000900)=0x14) open(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) 17:30:38 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@mcast2={0xff, 0x2, [], 0x1}, @in6=@dev={0xfe, 0x80}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0xe8) 17:30:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) 17:30:38 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00') 17:30:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000000)=""/40) 17:30:38 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00'}, 0x10) 17:30:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_xfrm(0x10, 0x3, 0x6) 17:30:38 executing program 7: socket$inet6(0xa, 0x0, 0x0) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) 17:30:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) open(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) 17:30:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) 17:30:38 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00') 17:30:38 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00'}, 0x10) 17:30:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000000)=""/40) 17:30:38 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@mcast2={0xff, 0x2, [], 0x1}, @in6=@dev={0xfe, 0x80}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0xe8) [ 921.945694] audit: type=1326 audit(1529688638.944:1768): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26855 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 922.012743] audit: type=1326 audit(1529688638.994:1769): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26868 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) 17:30:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00'}, 0x10) 17:30:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00') 17:30:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@mcast2={0xff, 0x2, [], 0x1}, @in6=@dev={0xfe, 0x80}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0xe8) 17:30:39 executing program 7: socket$inet6(0xa, 0x0, 0x0) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) 17:30:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) open(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) 17:30:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) 17:30:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00'}, 0x10) 17:30:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_xfrm(0x10, 0x3, 0x6) 17:30:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00') 17:30:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@mcast2={0xff, 0x2, [], 0x1}, @in6=@dev={0xfe, 0x80}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0xe8) 17:30:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) 17:30:39 executing program 7: socket$inet6(0xa, 0x0, 0x0) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) 17:30:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) open(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) 17:30:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00'}, 0x10) 17:30:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000000)=""/40) [ 922.946603] audit: type=1326 audit(1529688639.945:1770): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26911 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00') 17:30:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00'}, 0x10) [ 923.030301] audit: type=1326 audit(1529688639.986:1771): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26922 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 923.050704] audit: type=1326 audit(1529688639.987:1772): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26925 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:40 executing program 1: accept$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000900)=0x14) open(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) 17:30:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00'}, 0x10) 17:30:40 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) 17:30:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@mcast2={0xff, 0x2, [], 0x1}, @in6=@dev={0xfe, 0x80}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0xe8) 17:30:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00') 17:30:40 executing program 1: accept$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000900)=0x14) open(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) [ 923.309050] audit: type=1326 audit(1529688640.307:1773): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26945 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:40 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) 17:30:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00'}, 0x10) 17:30:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00') 17:30:40 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) 17:30:40 executing program 1: accept$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000900)=0x14) open(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) 17:30:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f00000000c0)) 17:30:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00'}, 0x10) [ 923.950178] audit: type=1326 audit(1529688640.945:1774): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26973 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000000)=""/40) 17:30:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00') 17:30:41 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) accept$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000900)=0x14) open(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) [ 924.094715] audit: type=1326 audit(1529688641.093:1775): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26982 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:41 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) 17:30:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f00000000c0)) 17:30:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00') 17:30:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@mcast2={0xff, 0x2, [], 0x1}, @in6=@dev={0xfe, 0x80}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0xe8) 17:30:41 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) accept$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000900)=0x14) open(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) 17:30:41 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) 17:30:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f00000000c0)) 17:30:41 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) 17:30:41 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) 17:30:41 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) accept$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000900)=0x14) open(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) [ 924.866922] kauditd_printk_skb: 3 callbacks suppressed [ 924.866951] audit: type=1326 audit(1529688641.865:1779): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27019 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:41 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) accept$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000900)=0x14) open(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) 17:30:42 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) 17:30:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00'}, 0x10) 17:30:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f00000000c0)) 17:30:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000900], 0x0, &(0x7f00000008c0), &(0x7f0000000900)=[{}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x1}]}, 0x108) 17:30:42 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) accept$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000900)=0x14) open(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) [ 925.190510] audit: type=1326 audit(1529688642.189:1780): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27047 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00') 17:30:42 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) accept$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000900)=0x14) open(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) 17:30:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@mcast2={0xff, 0x2, [], 0x1}, @in6=@dev={0xfe, 0x80}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0xe8) 17:30:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f00000000c0)) [ 925.339153] audit: type=1326 audit(1529688642.337:1781): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27056 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:42 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) 17:30:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000900], 0x0, &(0x7f00000008c0), &(0x7f0000000900)=[{}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x1}]}, 0x108) [ 925.465716] audit: type=1326 audit(1529688642.404:1782): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27062 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:42 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) accept$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000900)=0x14) open(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) 17:30:42 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) accept$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000900)=0x14) open(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) 17:30:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f00000000c0)) 17:30:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000900], 0x0, &(0x7f00000008c0), &(0x7f0000000900)=[{}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x1}]}, 0x108) 17:30:42 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) 17:30:42 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50091}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000080), 0x4) 17:30:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00'}, 0x10) 17:30:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) accept$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000900)=0x14) open(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) 17:30:43 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f00000000c0)) 17:30:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) [ 926.134780] audit: type=1326 audit(1529688643.133:1783): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27111 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00') 17:30:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000900], 0x0, &(0x7f00000008c0), &(0x7f0000000900)=[{}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x1}]}, 0x108) 17:30:43 executing program 6: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f00000000c0)) 17:30:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50091}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000080), 0x4) 17:30:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) accept$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000900)=0x14) open(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) 17:30:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) 17:30:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) [ 926.310314] audit: type=1326 audit(1529688643.309:1784): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27121 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:43 executing program 6: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f00000000c0)) [ 926.417167] audit: type=1326 audit(1529688643.377:1786): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27126 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 926.437296] audit: type=1326 audit(1529688643.376:1785): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27130 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000900], 0x0, &(0x7f00000008c0), &(0x7f0000000900)=[{}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x1}]}, 0x108) 17:30:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) 17:30:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50091}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000080), 0x4) 17:30:43 executing program 6: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f00000000c0)) 17:30:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) 17:30:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000900], 0x0, &(0x7f00000008c0), &(0x7f0000000900)=[{}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x1}]}, 0x108) 17:30:44 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f00000000c0)) 17:30:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50091}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000080), 0x4) 17:30:44 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f00000000c0)) 17:30:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000000c0), 0x10) 17:30:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000900], 0x0, &(0x7f00000008c0), &(0x7f0000000900)=[{}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x1}]}, 0x108) 17:30:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50091}]}) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000080), 0x4) 17:30:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000040)) fgetxattr(0xffffffffffffffff, &(0x7f0000000180)=@random={'btrfs.', '\'selinux-*systemmd5sum!vboxnet1bdevsecurity\x00'}, &(0x7f00000001c0)=""/145, 0x91) 17:30:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) 17:30:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) accept$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000900)=0x14) open(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) 17:30:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) 17:30:44 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f00000000c0)) [ 927.432713] audit: type=1326 audit(1529688644.431:1787): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27188 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:44 executing program 2: socket$inet6(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000900], 0x0, &(0x7f00000008c0), &(0x7f0000000900)=[{}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x1}]}, 0x108) 17:30:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000000c0), 0x10) 17:30:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50091}]}) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000080), 0x4) 17:30:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) [ 927.521902] audit: type=1326 audit(1529688644.453:1788): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27189 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'veth0_to_team\x00'}) 17:30:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f00000000c0)) 17:30:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000000c0), 0x10) 17:30:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50091}]}) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000080), 0x4) 17:30:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) 17:30:44 executing program 2: socket$inet6(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000900], 0x0, &(0x7f00000008c0), &(0x7f0000000900)=[{}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x1}]}, 0x108) 17:30:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f00000000c0)) 17:30:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000400)=""/65, &(0x7f0000000480)=0x41) 17:30:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) 17:30:45 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) accept$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000900)=0x14) open(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) 17:30:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000000c0), 0x10) 17:30:45 executing program 0: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000080), 0x4) 17:30:45 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) 17:30:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f00000000c0)) 17:30:45 executing program 2: socket$inet6(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000900], 0x0, &(0x7f00000008c0), &(0x7f0000000900)=[{}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x1}]}, 0x108) 17:30:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000400)=""/65, &(0x7f0000000480)=0x41) 17:30:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f00000000c0)) 17:30:45 executing program 0: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000080), 0x4) 17:30:45 executing program 4: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) 17:30:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000400)=""/65, &(0x7f0000000480)=0x41) 17:30:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000000c0), 0x10) 17:30:45 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000900], 0x0, &(0x7f00000008c0), &(0x7f0000000900)=[{}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x1}]}, 0x108) 17:30:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f00000000c0)) 17:30:45 executing program 0: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000080), 0x4) 17:30:46 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000900], 0x0, &(0x7f00000008c0), &(0x7f0000000900)=[{}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x1}]}, 0x108) 17:30:46 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50091}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000080), 0x4) 17:30:46 executing program 4: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) 17:30:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f00000000c0)) 17:30:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000000)={'HL\x00'}, &(0x7f0000000040)=0x1e) 17:30:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) setns(0xffffffffffffffff, 0x0) 17:30:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000400)=""/65, &(0x7f0000000480)=0x41) 17:30:46 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000000c0), 0x10) 17:30:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f00000000c0)) 17:30:46 executing program 4: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) 17:30:46 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50091}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000080), 0x4) 17:30:46 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000000c0), 0x10) 17:30:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000400)=""/65, &(0x7f0000000480)=0x41) 17:30:46 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000900], 0x0, &(0x7f00000008c0), &(0x7f0000000900)=[{}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x1}]}, 0x108) 17:30:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) setns(0xffffffffffffffff, 0x0) 17:30:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000000)={'HL\x00'}, &(0x7f0000000040)=0x1e) 17:30:46 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50091}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000080), 0x4) 17:30:46 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) 17:30:46 executing program 3: socket(0x0, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000000c0), 0x10) 17:30:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000400)=""/65, &(0x7f0000000480)=0x41) 17:30:46 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000900], 0x0, &(0x7f00000008c0), &(0x7f0000000900)=[{}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x1}]}, 0x108) 17:30:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000000)={'HL\x00'}, &(0x7f0000000040)=0x1e) 17:30:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) setns(0xffffffffffffffff, 0x0) 17:30:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000080), 0x4) 17:30:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000080), 0x4) 17:30:47 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f00000000c0)) 17:30:47 executing program 3: socket(0x0, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000000c0), 0x10) 17:30:47 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000000)={'HL\x00'}, &(0x7f0000000040)=0x1e) 17:30:47 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) 17:30:47 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) setns(0xffffffffffffffff, 0x0) 17:30:47 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000400)=""/65, &(0x7f0000000480)=0x41) 17:30:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000900], 0x0, &(0x7f00000008c0), &(0x7f0000000900)=[{}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x1}]}, 0x108) [ 930.576430] kauditd_printk_skb: 3 callbacks suppressed [ 930.576451] audit: type=1326 audit(1529688647.575:1792): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27399 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:47 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) 17:30:47 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000000)={'HL\x00'}, &(0x7f0000000040)=0x1e) 17:30:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000080), 0x4) 17:30:47 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) setns(0xffffffffffffffff, 0x0) 17:30:47 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000400)=""/65, &(0x7f0000000480)=0x41) 17:30:47 executing program 3: socket(0x0, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000000c0), 0x10) 17:30:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000900], 0x0, &(0x7f00000008c0), &(0x7f0000000900)=[{}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x1}]}, 0x108) 17:30:47 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000000)={'HL\x00'}, &(0x7f0000000040)=0x1e) 17:30:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50091}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000080), 0x4) 17:30:48 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) setns(0xffffffffffffffff, 0x0) 17:30:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000900], 0x0, &(0x7f00000008c0), &(0x7f0000000900)=[{}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x1}]}, 0x108) 17:30:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) 17:30:48 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000000c0), 0x10) 17:30:48 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000400)=""/65, &(0x7f0000000480)=0x41) 17:30:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50091}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000080), 0x4) 17:30:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f00000000c0)) 17:30:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000000)={'HL\x00'}, &(0x7f0000000040)=0x1e) 17:30:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) [ 931.557450] audit: type=1326 audit(1529688648.555:1793): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27457 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:48 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000400)=""/65, &(0x7f0000000480)=0x41) 17:30:48 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) setns(0xffffffffffffffff, 0x0) 17:30:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50091}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000080), 0x4) 17:30:48 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000000)={'HL\x00'}, &(0x7f0000000040)=0x1e) 17:30:48 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000000c0), 0x10) 17:30:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000900], 0x0, &(0x7f00000008c0), &(0x7f0000000900)=[{}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x1}]}, 0x108) 17:30:48 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000000)={'HL\x00'}, &(0x7f0000000040)=0x1e) 17:30:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) 17:30:49 executing program 7: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) setns(0xffffffffffffffff, 0x0) 17:30:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000080), 0x4) 17:30:49 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000400)=""/65, &(0x7f0000000480)=0x41) 17:30:49 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) 17:30:49 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000000c0), 0x10) 17:30:49 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000280)=0xe8) setreuid(0x0, 0x0) 17:30:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000900], 0x0, &(0x7f00000008c0), &(0x7f0000000900)=[{}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x1}]}, 0x108) 17:30:49 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000000)={'HL\x00'}, &(0x7f0000000040)=0x1e) [ 932.492037] audit: type=1326 audit(1529688649.490:1794): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27498 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:49 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) 17:30:49 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000000)={'HL\x00'}, &(0x7f0000000040)=0x1e) 17:30:49 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000400)=""/65, &(0x7f0000000480)=0x41) 17:30:49 executing program 7: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) setns(0xffffffffffffffff, 0x0) 17:30:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)) socket(0x0, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000000c0), 0x10) 17:30:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000900], 0x0, &(0x7f00000008c0), &(0x7f0000000900)=[{}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x1}]}, 0x108) [ 932.771475] audit: type=1326 audit(1529688649.770:1795): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27533 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:49 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000280)=0xe8) setreuid(0x0, 0x0) 17:30:49 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000000)={'HL\x00'}, &(0x7f0000000040)=0x1e) 17:30:49 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) 17:30:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)) socket(0x0, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000000c0), 0x10) 17:30:50 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000280)=0xe8) setreuid(0x0, 0x0) 17:30:50 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000400)=""/65, &(0x7f0000000480)=0x41) 17:30:50 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000000)={'HL\x00'}, &(0x7f0000000040)=0x1e) 17:30:50 executing program 7: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) setns(0xffffffffffffffff, 0x0) 17:30:50 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) 17:30:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000080), 0x4) [ 933.435539] audit: type=1326 audit(1529688650.434:1796): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27555 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:50 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) setns(0xffffffffffffffff, 0x0) 17:30:50 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000000)={'HL\x00'}, &(0x7f0000000040)=0x1e) 17:30:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000080)}) socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000400)=""/65, &(0x7f0000000480)=0x41) [ 933.515888] audit: type=1326 audit(1529688650.485:1797): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27568 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:50 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000280)=0xe8) setreuid(0x0, 0x0) 17:30:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)) socket(0x0, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000000c0), 0x10) 17:30:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000900], 0x0, &(0x7f00000008c0), &(0x7f0000000900)=[{}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x1}]}, 0x108) 17:30:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000080)}) socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000400)=""/65, &(0x7f0000000480)=0x41) 17:30:50 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000000)={'HL\x00'}, &(0x7f0000000040)=0x1e) 17:30:50 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) setns(0xffffffffffffffff, 0x0) 17:30:50 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) setreuid(0x0, 0x0) [ 933.887667] audit: type=1326 audit(1529688650.886:1798): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27590 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:51 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000080), 0x4) 17:30:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000000c0), 0x10) 17:30:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000080)}) socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000400)=""/65, &(0x7f0000000480)=0x41) 17:30:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000000)={'HL\x00'}, &(0x7f0000000040)=0x1e) 17:30:51 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) setns(0xffffffffffffffff, 0x0) 17:30:51 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) setreuid(0x0, 0x0) 17:30:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) [ 934.460715] audit: type=1326 audit(1529688651.459:1799): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27611 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000000)={'HL\x00'}, &(0x7f0000000040)=0x1e) 17:30:51 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) setns(0xffffffffffffffff, 0x0) [ 934.538775] audit: type=1326 audit(1529688651.488:1800): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27624 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x50012}]}) socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000400)=""/65, &(0x7f0000000480)=0x41) 17:30:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000000c0), 0x10) 17:30:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000900], 0x0, &(0x7f00000008c0), &(0x7f0000000900)=[{}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x1}]}, 0x108) 17:30:51 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) setreuid(0x0, 0x0) 17:30:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000000)={'HL\x00'}, &(0x7f0000000040)=0x1e) 17:30:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x50012}]}) socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000400)=""/65, &(0x7f0000000480)=0x41) 17:30:51 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) setns(0xffffffffffffffff, 0x0) [ 934.939673] audit: type=1326 audit(1529688651.938:1801): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27654 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) 17:30:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000000c0), 0x10) 17:30:52 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000000)={'HL\x00'}, &(0x7f0000000040)=0x1e) 17:30:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x50012}]}) socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000400)=""/65, &(0x7f0000000480)=0x41) 17:30:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) close(0xffffffffffffffff) 17:30:52 executing program 6: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000280)=0xe8) setreuid(0x0, 0x0) 17:30:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) setns(0xffffffffffffffff, 0x0) 17:30:52 executing program 6: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000280)=0xe8) setreuid(0x0, 0x0) 17:30:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) socket(0x0, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000000c0), 0x10) 17:30:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020d}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) setns(0xffffffffffffffff, 0x0) 17:30:52 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000000)={'HL\x00'}, &(0x7f0000000040)=0x1e) [ 935.669585] kauditd_printk_skb: 1 callbacks suppressed [ 935.669609] audit: type=1326 audit(1529688652.668:1803): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27688 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 935.766090] audit: type=1326 audit(1529688652.732:1804): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27691 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000340), &(0x7f0000000380)=0x14) 17:30:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000400)=""/65, &(0x7f0000000480)=0x41) 17:30:52 executing program 6: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000280)=0xe8) setreuid(0x0, 0x0) 17:30:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020d}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) setns(0xffffffffffffffff, 0x0) 17:30:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050206}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000040)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000001c0)) [ 935.890274] audit: type=1326 audit(1529688652.888:1805): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27702 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000180)='#]vmnet0\x00', 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) 17:30:53 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000280)=0xe8) setreuid(0x0, 0x0) 17:30:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020d}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) setns(0xffffffffffffffff, 0x0) 17:30:53 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50010}]}) socket(0x0, 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[]) 17:30:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000340), &(0x7f0000000380)=0x14) 17:30:53 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000280)=0xe8) setreuid(0x0, 0x0) 17:30:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) setns(0xffffffffffffffff, 0x0) 17:30:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000154c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000015480)={&(0x7f0000014e80)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) [ 936.642027] audit: type=1326 audit(1529688653.640:1806): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27733 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) socket(0x0, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000000c0), 0x10) 17:30:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000340), &(0x7f0000000380)=0x14) 17:30:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000000)={'HL\x00'}, &(0x7f0000000040)=0x1e) 17:30:53 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000280)=0xe8) setreuid(0x0, 0x0) [ 936.765883] audit: type=1326 audit(1529688653.760:1807): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27742 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000400)=""/65, &(0x7f0000000480)=0x41) 17:30:53 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50010}]}) socket(0x0, 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[]) 17:30:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) [ 936.890326] audit: type=1326 audit(1529688653.865:1808): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27750 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000340), &(0x7f0000000380)=0x14) [ 936.988437] audit: type=1326 audit(1529688653.973:1809): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27758 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:54 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000280)=0xe8) setreuid(0x0, 0x0) 17:30:54 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50010}]}) socket(0x0, 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[]) 17:30:54 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000280)=0xe8) setreuid(0x0, 0x0) 17:30:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) 17:30:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000340), &(0x7f0000000380)=0x14) 17:30:54 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50010}]}) socket(0x0, 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[]) 17:30:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) setns(0xffffffffffffffff, 0x0) 17:30:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) [ 937.603871] audit: type=1326 audit(1529688654.602:1810): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27793 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) socket(0x0, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000000c0), 0x10) 17:30:54 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000280)=0xe8) setreuid(0x0, 0x0) 17:30:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000340), &(0x7f0000000380)=0x14) 17:30:54 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50010}]}) fremovexattr(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[]) [ 937.821290] audit: type=1326 audit(1529688654.820:1811): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27803 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000400)=""/65, &(0x7f0000000480)=0x41) 17:30:54 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000000)={'HL\x00'}, &(0x7f0000000040)=0x1e) 17:30:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) 17:30:54 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50010}]}) fremovexattr(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[]) 17:30:54 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020f}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000280)=0xe8) setreuid(0x0, 0x0) [ 937.995432] audit: type=1326 audit(1529688654.994:1812): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27813 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:55 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000340), &(0x7f0000000380)=0x14) 17:30:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) 17:30:55 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50010}]}) fremovexattr(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[]) 17:30:55 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020f}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000280)=0xe8) setreuid(0x0, 0x0) 17:30:55 executing program 0: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000340), &(0x7f0000000380)=0x14) 17:30:55 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) setns(0xffffffffffffffff, 0x0) 17:30:55 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020f}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000280)=0xe8) setreuid(0x0, 0x0) 17:30:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) 17:30:55 executing program 4: socket(0x0, 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[]) 17:30:55 executing program 0: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000340), &(0x7f0000000380)=0x14) 17:30:55 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000280)=0xe8) setreuid(0x0, 0x0) 17:30:55 executing program 0: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000340), &(0x7f0000000380)=0x14) 17:30:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000240)) 17:30:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) 17:30:55 executing program 4: socket(0x0, 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[]) 17:30:55 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), 0xc) 17:30:55 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f00000002c0)) 17:30:56 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000340), &(0x7f0000000380)=0x14) 17:30:56 executing program 4: socket(0x0, 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[]) 17:30:56 executing program 2: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) 17:30:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000240)) 17:30:56 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000340), &(0x7f0000000380)=0x14) 17:30:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), 0xc) 17:30:56 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f00000002c0)) 17:30:56 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) recvmmsg(0xffffffffffffffff, &(0x7f00000014c0), 0x0, 0x0, 0x0) 17:30:56 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50010}]}) socket(0x0, 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[]) 17:30:56 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000280)=0xe8) setreuid(0x0, 0x0) 17:30:56 executing program 2: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) 17:30:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000240)) 17:30:56 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000340), &(0x7f0000000380)=0x14) 17:30:56 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50010}]}) socket(0x0, 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[]) 17:30:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), 0xc) 17:30:56 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f00000002c0)) 17:30:56 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000280), 0x0, 0x0) 17:30:56 executing program 2: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) 17:30:56 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000340), &(0x7f0000000380)=0x14) 17:30:56 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50010}]}) socket(0x0, 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[]) 17:30:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000240)) 17:30:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) capget(&(0x7f0000000000), &(0x7f00000000c0)) 17:30:56 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f00000002c0)) 17:30:57 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) 17:30:57 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) recvmmsg(0xffffffffffffffff, &(0x7f0000008100), 0x0, 0x0, &(0x7f0000008280)) 17:30:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000240)) 17:30:57 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000280)=0xe8) setreuid(0x0, 0x0) 17:30:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000340), &(0x7f0000000380)=0x14) 17:30:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socket(0x0, 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[]) 17:30:57 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) 17:30:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f00000002c0)) 17:30:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) capget(&(0x7f0000000000), &(0x7f00000000c0)) 17:30:57 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) recvmmsg(0xffffffffffffffff, &(0x7f0000008100), 0x0, 0x0, &(0x7f0000008280)) [ 940.779442] kauditd_printk_skb: 4 callbacks suppressed [ 940.779467] audit: type=1326 audit(1529688657.778:1817): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27988 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:57 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) 17:30:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000340), &(0x7f0000000380)=0x14) 17:30:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f00000002c0)) 17:30:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socket(0x0, 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[]) 17:30:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) capget(&(0x7f0000000000), &(0x7f00000000c0)) 17:30:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000240)) 17:30:57 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) recvmmsg(0xffffffffffffffff, &(0x7f0000008100), 0x0, 0x0, &(0x7f0000008280)) 17:30:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) 17:30:58 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socket(0x0, 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[]) 17:30:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000240)) 17:30:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000340), &(0x7f0000000380)=0x14) 17:30:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) recvmmsg(0xffffffffffffffff, &(0x7f0000008100), 0x0, 0x0, &(0x7f0000008280)) 17:30:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) 17:30:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f00000002c0)) 17:30:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) capget(&(0x7f0000000000), &(0x7f00000000c0)) 17:30:58 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x50010}]}) socket(0x0, 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[]) 17:30:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000480)=""/4096}, 0x18) 17:30:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000340), &(0x7f0000000380)=0x14) 17:30:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) 17:30:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) capget(&(0x7f0000000000), &(0x7f00000000c0)) 17:30:58 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x50010}]}) socket(0x0, 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[]) 17:30:58 executing program 3: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000240)) 17:30:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000008100), 0x0, 0x0, &(0x7f0000008280)) 17:30:58 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f00000002c0)) 17:30:59 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000480)=""/4096}, 0x18) 17:30:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) 17:30:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000340), &(0x7f0000000380)=0x14) 17:30:59 executing program 3: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000240)) 17:30:59 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f00000002c0)) 17:30:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) capget(&(0x7f0000000000), &(0x7f00000000c0)) 17:30:59 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x50010}]}) socket(0x0, 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[]) 17:30:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000008100), 0x0, 0x0, &(0x7f0000008280)) 17:30:59 executing program 3: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000240)) 17:30:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000340), &(0x7f0000000380)=0x14) 17:30:59 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000480)=""/4096}, 0x18) 17:30:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) 17:30:59 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f00000002c0)) 17:30:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) capget(&(0x7f0000000000), &(0x7f00000000c0)) [ 942.448900] audit: type=1326 audit(1529688659.447:1818): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28097 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:59 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) socket(0x0, 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[]) 17:30:59 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000240)) 17:30:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000008100), 0x0, 0x0, &(0x7f0000008280)) 17:30:59 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f00000002c0)) 17:30:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) [ 942.632708] audit: type=1326 audit(1529688659.631:1819): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28112 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:30:59 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000480)=""/4096}, 0x18) 17:30:59 executing program 1: pipe(&(0x7f0000000080)) capget(&(0x7f0000000000), &(0x7f00000000c0)) 17:30:59 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000240)) 17:30:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) 17:30:59 executing program 7: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) recvmmsg(0xffffffffffffffff, &(0x7f0000008100), 0x0, 0x0, &(0x7f0000008280)) 17:30:59 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f00000002c0)) [ 943.034724] audit: type=1326 audit(1529688660.033:1820): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28140 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:31:00 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000340), &(0x7f0000000380)=0x14) 17:31:00 executing program 1: pipe(&(0x7f0000000080)) capget(&(0x7f0000000000), &(0x7f00000000c0)) 17:31:00 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000480)=""/4096}, 0x18) 17:31:00 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000240)) 17:31:00 executing program 7: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) recvmmsg(0xffffffffffffffff, &(0x7f0000008100), 0x0, 0x0, &(0x7f0000008280)) [ 943.445531] audit: type=1326 audit(1529688660.444:1821): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28160 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:31:00 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) socket(0x0, 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[]) 17:31:00 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f00000002c0)) 17:31:00 executing program 7: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) recvmmsg(0xffffffffffffffff, &(0x7f0000008100), 0x0, 0x0, &(0x7f0000008280)) 17:31:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000240)) 17:31:00 executing program 1: pipe(&(0x7f0000000080)) capget(&(0x7f0000000000), &(0x7f00000000c0)) 17:31:00 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000480)=""/4096}, 0x18) 17:31:00 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) capget(&(0x7f0000000000), &(0x7f00000000c0)) 17:31:00 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f00000002c0)) [ 943.682874] audit: type=1326 audit(1529688660.681:1822): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28177 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:31:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) 17:31:00 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) recvmmsg(0xffffffffffffffff, &(0x7f0000008100), 0x0, 0x0, &(0x7f0000008280)) 17:31:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000240)) [ 943.977874] audit: type=1326 audit(1529688660.976:1823): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28196 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:31:01 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000340), &(0x7f0000000380)=0x14) 17:31:01 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000480)=""/4096}, 0x18) 17:31:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f00000002c0)) 17:31:01 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) capget(&(0x7f0000000000), &(0x7f00000000c0)) 17:31:01 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) recvmmsg(0xffffffffffffffff, &(0x7f0000008100), 0x0, 0x0, &(0x7f0000008280)) [ 944.382869] audit: type=1326 audit(1529688661.381:1824): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28202 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:31:01 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) socket(0x0, 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[]) 17:31:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000240)) 17:31:01 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) recvmmsg(0xffffffffffffffff, &(0x7f0000008100), 0x0, 0x0, &(0x7f0000008280)) 17:31:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f00000002c0)) 17:31:01 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) capget(&(0x7f0000000000), &(0x7f00000000c0)) 17:31:01 executing program 6: socket$nl_netfilter(0x10, 0x3, 0xc) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000480)=""/4096}, 0x18) 17:31:01 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) recvmmsg(0xffffffffffffffff, &(0x7f0000008100), 0x0, 0x0, &(0x7f0000008280)) [ 944.663605] audit: type=1326 audit(1529688661.662:1825): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28228 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:31:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000240)) 17:31:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f00000002c0)) 17:31:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) 17:31:01 executing program 6: socket$nl_netfilter(0x10, 0x3, 0xc) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000480)=""/4096}, 0x18) [ 944.949352] audit: type=1326 audit(1529688661.947:1826): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28247 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:31:02 executing program 6: socket$nl_netfilter(0x10, 0x3, 0xc) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000480)=""/4096}, 0x18) 17:31:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) pipe(&(0x7f0000000080)) capget(&(0x7f0000000000), &(0x7f00000000c0)) 17:31:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f00000002c0)) 17:31:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000240)) 17:31:02 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) recvmmsg(0xffffffffffffffff, &(0x7f0000008100), 0x0, 0x0, &(0x7f0000008280)) 17:31:02 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000480)=""/4096}, 0x18) 17:31:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000280)) 17:31:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) pipe(&(0x7f0000000080)) capget(&(0x7f0000000000), &(0x7f00000000c0)) 17:31:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f00000002c0)) 17:31:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000240)) 17:31:02 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) recvmmsg(0xffffffffffffffff, &(0x7f0000008100), 0x0, 0x0, &(0x7f0000008280)) 17:31:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000000), &(0x7f0000000080)=0x30) 17:31:02 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) recvmmsg(0xffffffffffffffff, &(0x7f0000008100), 0x0, 0x0, &(0x7f0000008280)) 17:31:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000240)) [ 945.799590] audit: type=1326 audit(1529688662.798:1827): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28287 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:31:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000280)) 17:31:02 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000480)=""/4096}, 0x18) 17:31:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f00000002c0)) 17:31:02 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) recvmmsg(0xffffffffffffffff, &(0x7f0000008100), 0x0, 0x0, &(0x7f0000008280)) 17:31:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x0, @multicast1=0xe0000001}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='veth0\x00'}) 17:31:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) pipe(&(0x7f0000000080)) capget(&(0x7f0000000000), &(0x7f00000000c0)) 17:31:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000000), &(0x7f0000000080)=0x30) [ 945.966397] audit: type=1326 audit(1529688662.965:1828): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28298 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:31:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) capget(&(0x7f0000000000), &(0x7f00000000c0)) 17:31:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) recvmmsg(0xffffffffffffffff, &(0x7f0000008100), 0x0, 0x0, &(0x7f0000008280)) 17:31:03 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000480)=""/4096}, 0x18) 17:31:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000280)) 17:31:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000000), &(0x7f0000000080)=0x30) 17:31:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x0, @multicast1=0xe0000001}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='veth0\x00'}) 17:31:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000480)=""/4096}, 0x18) 17:31:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) recvmmsg(0xffffffffffffffff, &(0x7f0000008100), 0x0, 0x0, &(0x7f0000008280)) [ 946.415048] audit: type=1326 audit(1529688663.413:1829): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28335 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:31:03 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000240)) 17:31:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) capget(&(0x7f0000000000), &(0x7f00000000c0)) 17:31:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000000), &(0x7f0000000080)=0x30) [ 946.724955] audit: type=1326 audit(1529688663.723:1830): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28349 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:31:03 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f00000002c0)) 17:31:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000280)) 17:31:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x0, @multicast1=0xe0000001}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='veth0\x00'}) 17:31:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000480)=""/4096}, 0x18) 17:31:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) capget(&(0x7f0000000000), &(0x7f00000000c0)) 17:31:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000000), &(0x7f0000000080)=0x30) [ 946.989267] audit: type=1326 audit(1529688663.988:1831): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28365 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:31:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000480)=""/4096}, 0x18) 17:31:04 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) pipe(&(0x7f0000000080)) capget(&(0x7f0000000000), &(0x7f00000000c0)) 17:31:04 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x0, @multicast1=0xe0000001}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='veth0\x00'}) 17:31:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000280)) 17:31:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000000), &(0x7f0000000080)=0x30) [ 947.187247] audit: type=1326 audit(1529688664.185:1832): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28370 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:31:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000480)=""/4096}, 0x18) 17:31:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) recvmmsg(0xffffffffffffffff, &(0x7f0000008100), 0x0, 0x0, &(0x7f0000008280)) [ 947.446660] audit: type=1326 audit(1529688664.445:1833): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28386 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:31:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000240)) 17:31:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000280)) 17:31:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000000), &(0x7f0000000080)=0x30) [ 947.708686] audit: type=1326 audit(1529688664.704:1834): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28398 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:31:04 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f00000002c0)) 17:31:04 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x0, @multicast1=0xe0000001}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='veth0\x00'}) 17:31:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000480)=""/4096}, 0x18) 17:31:04 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000000), &(0x7f0000000080)=0x30) 17:31:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000280)) 17:31:05 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000000), &(0x7f0000000080)=0x30) [ 947.979733] audit: type=1326 audit(1529688664.978:1835): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28414 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:31:05 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000480)=""/4096}, 0x18) 17:31:05 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) pipe(&(0x7f0000000080)) capget(&(0x7f0000000000), &(0x7f00000000c0)) 17:31:05 executing program 0: pipe2(&(0x7f0000000040), 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000280)) 17:31:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x0, @multicast1=0xe0000001}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='veth0\x00'}) 17:31:05 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000480)=""/4096}, 0x18) 17:31:05 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000000), &(0x7f0000000080)=0x30) [ 948.263930] audit: type=1326 audit(1529688665.262:1836): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28424 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:31:05 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) recvmmsg(0xffffffffffffffff, &(0x7f0000008100), 0x0, 0x0, &(0x7f0000008280)) 17:31:05 executing program 0: pipe2(&(0x7f0000000040), 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000280)) 17:31:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x0, @multicast1=0xe0000001}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='veth0\x00'}) 17:31:05 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000000), &(0x7f0000000080)=0x30) 17:31:05 executing program 0: pipe2(&(0x7f0000000040), 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000280)) 17:31:05 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000000), &(0x7f0000000080)=0x30) 17:31:05 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x0, @multicast1=0xe0000001}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='veth0\x00'}) 17:31:06 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000000), &(0x7f0000000080)=0x30) 17:31:06 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000280)) 17:31:06 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x0, @multicast1=0xe0000001}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='veth0\x00'}) 17:31:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000000), &(0x7f0000000080)=0x30) 17:31:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) pipe(&(0x7f0000000080)) capget(&(0x7f0000000000), &(0x7f00000000c0)) 17:31:06 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000280)) 17:31:06 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000480)=""/4096}, 0x18) 17:31:06 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x0, @multicast1=0xe0000001}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='veth0\x00'}) 17:31:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000000), &(0x7f0000000080)=0x30) 17:31:06 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x0, @multicast1=0xe0000001}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='veth0\x00'}) 17:31:06 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000280)) 17:31:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000000), &(0x7f0000000080)=0x30) 17:31:06 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000040), 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000280)) 17:31:06 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x0, @multicast1=0xe0000001}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='veth0\x00'}) 17:31:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020d}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000000), &(0x7f0000000080)=0x30) 17:31:06 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000040), 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000280)) 17:31:06 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x0, @multicast1=0xe0000001}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='veth0\x00'}) 17:31:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020d}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000000), &(0x7f0000000080)=0x30) 17:31:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000040), 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000280)) 17:31:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x0, @multicast1=0xe0000001}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='veth0\x00'}) 17:31:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x0, @multicast1=0xe0000001}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='veth0\x00'}) 17:31:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020d}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000000), &(0x7f0000000080)=0x30) 17:31:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000480)=""/4096}, 0x18) 17:31:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000280)) 17:31:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x0) 17:31:07 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) fsync(0xffffffffffffffff) 17:31:07 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) 17:31:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000001180)) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 17:31:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x0, @multicast1=0xe0000001}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='veth0\x00'}) 17:31:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000000), &(0x7f0000000080)=0x30) 17:31:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000280)) 17:31:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x0, @multicast1=0xe0000001}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='veth0\x00'}) 17:31:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 17:31:07 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 17:31:07 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) fsync(0xffffffffffffffff) 17:31:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x0) 17:31:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000280)) 17:31:08 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000280)) 17:31:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x0, @multicast1=0xe0000001}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='veth0\x00'}) 17:31:08 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) fsync(0xffffffffffffffff) 17:31:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) inotify_init() fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:31:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x0) 17:31:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 17:31:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000d}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000001c0), 0x4) [ 951.277216] kauditd_printk_skb: 6 callbacks suppressed [ 951.277236] audit: type=1326 audit(1529688668.275:1843): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28589 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:31:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x0, @multicast1=0xe0000001}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='veth0\x00'}) 17:31:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000000), &(0x7f0000000080)=0x30) 17:31:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x0) 17:31:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 17:31:08 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) fsync(0xffffffffffffffff) 17:31:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x0, @multicast1=0xe0000001}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='veth0\x00'}) 17:31:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) prctl$setfpexc(0xc, 0x0) 17:31:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) inotify_init() fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 951.633837] audit: type=1326 audit(1529688668.632:1844): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28617 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:31:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000048c0)={&(0x7f0000000240)={0x10}, 0xc, &(0x7f0000004880)={&(0x7f0000004840)=@getstats={0x1c, 0x5e}, 0x1c}, 0x1}, 0x0) [ 951.716278] audit: type=1326 audit(1529688668.680:1845): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28628 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:31:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000280)) 17:31:09 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x0) 17:31:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) inotify_init() fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:31:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) prctl$setfpexc(0xc, 0x0) 17:31:09 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) fsync(0xffffffffffffffff) 17:31:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000048c0)={&(0x7f0000000240)={0x10}, 0xc, &(0x7f0000004880)={&(0x7f0000004840)=@getstats={0x1c, 0x5e}, 0x1c}, 0x1}, 0x0) [ 952.219482] audit: type=1326 audit(1529688669.218:1846): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28652 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:31:09 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) fsync(0xffffffffffffffff) 17:31:09 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x0) 17:31:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) inotify_init() fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:31:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x0, @multicast1=0xe0000001}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='veth0\x00'}) 17:31:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) prctl$setfpexc(0xc, 0x0) 17:31:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000048c0)={&(0x7f0000000240)={0x10}, 0xc, &(0x7f0000004880)={&(0x7f0000004840)=@getstats={0x1c, 0x5e}, 0x1c}, 0x1}, 0x0) 17:31:09 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000000), &(0x7f0000000080)=0x30) 17:31:09 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x0) 17:31:09 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) fsync(0xffffffffffffffff) [ 952.625090] audit: type=1326 audit(1529688669.623:1847): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28669 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 952.716183] audit: type=1326 audit(1529688669.668:1848): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28680 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:31:09 executing program 3: memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) fsync(0xffffffffffffffff) 17:31:10 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000280)) 17:31:10 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:31:10 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) prctl$setfpexc(0xc, 0x0) 17:31:10 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) accept$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, @local}, &(0x7f0000000340)=0x10) 17:31:10 executing program 5: socket$nl_netfilter(0x10, 0x3, 0xc) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x0) 17:31:10 executing program 3: memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) fsync(0xffffffffffffffff) [ 953.228565] audit: type=1326 audit(1529688670.227:1849): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28703 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:31:10 executing program 5: socket$nl_netfilter(0x10, 0x3, 0xc) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x0) 17:31:10 executing program 3: memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) fsync(0xffffffffffffffff) 17:31:10 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:31:10 executing program 5: socket$nl_netfilter(0x10, 0x3, 0xc) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x0) 17:31:10 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) prctl$setfpexc(0xc, 0x0) 17:31:10 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) accept$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, @local}, &(0x7f0000000340)=0x10) 17:31:10 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) fsync(0xffffffffffffffff) 17:31:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x0, @multicast1=0xe0000001}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='veth0\x00'}) 17:31:10 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:31:10 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) sched_getaffinity(0x0, 0x8, &(0x7f00000000c0)) [ 953.635336] audit: type=1326 audit(1529688670.634:1850): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28730 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:31:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) prctl$setfpexc(0xc, 0x0) 17:31:11 executing program 7: inotify_init() fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:31:11 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x0) 17:31:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) sched_getaffinity(0x0, 0x8, &(0x7f00000000c0)) 17:31:11 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) fsync(0xffffffffffffffff) 17:31:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) accept$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, @local}, &(0x7f0000000340)=0x10) 17:31:11 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001480)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) 17:31:11 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x0) 17:31:11 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) fsync(0xffffffffffffffff) 17:31:11 executing program 7: inotify_init() fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:31:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) sched_getaffinity(0x0, 0x8, &(0x7f00000000c0)) 17:31:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) prctl$setfpexc(0xc, 0x0) 17:31:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) accept$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, @local}, &(0x7f0000000340)=0x10) 17:31:11 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x0) 17:31:11 executing program 7: inotify_init() fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:31:11 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001480)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) 17:31:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) sched_getaffinity(0x0, 0x8, &(0x7f00000000c0)) 17:31:11 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) fsync(0xffffffffffffffff) 17:31:11 executing program 6: socket$inet6(0xa, 0x0, 0x0) prctl$setfpexc(0xc, 0x0) 17:31:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000000), 0x4) 17:31:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) accept$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, @local}, &(0x7f0000000340)=0x10) 17:31:11 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) inotify_init() fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:31:11 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socket$nl_netfilter(0x10, 0x3, 0xc) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x0) 17:31:11 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) fsync(0xffffffffffffffff) 17:31:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) sched_getaffinity(0x0, 0x8, &(0x7f00000000c0)) 17:31:11 executing program 6: socket$inet6(0xa, 0x0, 0x0) prctl$setfpexc(0xc, 0x0) 17:31:11 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001480)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) 17:31:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) accept$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, @local}, &(0x7f0000000340)=0x10) 17:31:12 executing program 2: capset(&(0x7f00001e8ff8)={0x19980330}, &(0x7f0000032fe8)) 17:31:12 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) inotify_init() fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:31:12 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) fsync(0xffffffffffffffff) 17:31:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socket$nl_netfilter(0x10, 0x3, 0xc) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x0) 17:31:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) sched_getaffinity(0x0, 0x8, &(0x7f00000000c0)) 17:31:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001480)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) 17:31:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) accept$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, @local}, &(0x7f0000000340)=0x10) 17:31:12 executing program 6: socket$inet6(0xa, 0x0, 0x0) prctl$setfpexc(0xc, 0x0) 17:31:12 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) inotify_init() fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:31:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) fchmod(0xffffffffffffffff, 0x0) 17:31:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socket$nl_netfilter(0x10, 0x3, 0xc) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x0) 17:31:12 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) fsync(0xffffffffffffffff) 17:31:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) sched_getaffinity(0x0, 0x8, &(0x7f00000000c0)) 17:31:12 executing program 1: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) accept$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, @local}, &(0x7f0000000340)=0x10) 17:31:12 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) inotify_init() fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:31:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001480)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) 17:31:12 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) prctl$setfpexc(0xc, 0x0) 17:31:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) fchmod(0xffffffffffffffff, 0x0) 17:31:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x0) 17:31:12 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) fsync(0xffffffffffffffff) 17:31:12 executing program 4: socket$inet6(0xa, 0x0, 0x0) sched_getaffinity(0x0, 0x8, &(0x7f00000000c0)) 17:31:12 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) inotify_init() fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:31:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x0) 17:31:12 executing program 1: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) accept$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, @local}, &(0x7f0000000340)=0x10) 17:31:12 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) fsync(0xffffffffffffffff) 17:31:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001480)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) 17:31:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) fchmod(0xffffffffffffffff, 0x0) 17:31:13 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) prctl$setfpexc(0xc, 0x0) 17:31:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) inotify_init() fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:31:13 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x0) 17:31:13 executing program 4: socket$inet6(0xa, 0x0, 0x0) sched_getaffinity(0x0, 0x8, &(0x7f00000000c0)) 17:31:13 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) fsync(0xffffffffffffffff) 17:31:13 executing program 1: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) accept$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, @local}, &(0x7f0000000340)=0x10) 17:31:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001480)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) [ 956.359663] audit: type=1326 audit(1529688673.358:1851): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28935 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:31:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) fchmod(0xffffffffffffffff, 0x0) 17:31:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) inotify_init() fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:31:13 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) prctl$setfpexc(0xc, 0x0) 17:31:13 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) socket$nl_netfilter(0x10, 0x3, 0xc) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x0) 17:31:13 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) accept$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, @local}, &(0x7f0000000340)=0x10) 17:31:13 executing program 4: socket$inet6(0xa, 0x0, 0x0) sched_getaffinity(0x0, 0x8, &(0x7f00000000c0)) [ 956.604349] audit: type=1326 audit(1529688673.602:1852): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28950 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:31:13 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001480)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) 17:31:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) fchmod(0xffffffffffffffff, 0x0) 17:31:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) inotify_init() fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:31:13 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) accept$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, @local}, &(0x7f0000000340)=0x10) 17:31:13 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001480)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) 17:31:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) prctl$setfpexc(0xc, 0x0) 17:31:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) inotify_init() fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:31:14 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) fsync(0xffffffffffffffff) 17:31:14 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) accept$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, @local}, &(0x7f0000000340)=0x10) 17:31:14 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) sched_getaffinity(0x0, 0x8, &(0x7f00000000c0)) 17:31:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) fchmod(0xffffffffffffffff, 0x0) 17:31:14 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001480)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) 17:31:14 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) inotify_init() fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 957.286246] audit: type=1326 audit(1529688674.285:1853): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29000 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 957.339061] audit: type=1326 audit(1529688674.337:1854): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29007 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:31:14 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) socket$nl_netfilter(0x10, 0x3, 0xc) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x0) 17:31:14 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) prctl$setfpexc(0xc, 0x0) 17:31:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) accept$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, @local}, &(0x7f0000000340)=0x10) 17:31:14 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001480)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) 17:31:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) fchmod(0xffffffffffffffff, 0x0) 17:31:14 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) sched_getaffinity(0x0, 0x8, &(0x7f00000000c0)) [ 957.575843] audit: type=1326 audit(1529688674.574:1855): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29028 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:31:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) accept$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, @local}, &(0x7f0000000340)=0x10) 17:31:14 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001480)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) 17:31:14 executing program 2: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) fchmod(0xffffffffffffffff, 0x0) 17:31:14 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) sched_getaffinity(0x0, 0x8, &(0x7f00000000c0)) 17:31:15 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) fsync(0xffffffffffffffff) 17:31:15 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) prctl$setfpexc(0xc, 0x0) 17:31:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) accept$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, @local}, &(0x7f0000000340)=0x10) 17:31:15 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001480)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) 17:31:15 executing program 2: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) fchmod(0xffffffffffffffff, 0x0) 17:31:15 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) sched_getaffinity(0x0, 0x8, &(0x7f00000000c0)) [ 958.302779] audit: type=1326 audit(1529688675.301:1856): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29067 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:31:15 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) socket$nl_netfilter(0x10, 0x3, 0xc) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x0) 17:31:15 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) inotify_init() fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:31:15 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001480)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) 17:31:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) accept$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, @local}, &(0x7f0000000340)=0x10) 17:31:15 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) prctl$setfpexc(0xc, 0x0) 17:31:15 executing program 2: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) fchmod(0xffffffffffffffff, 0x0) 17:31:15 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) sched_getaffinity(0x0, 0x8, &(0x7f00000000c0)) [ 958.512460] audit: type=1326 audit(1529688675.511:1857): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29081 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:31:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) accept$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, @local}, &(0x7f0000000340)=0x10) 17:31:15 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) fchmod(0xffffffffffffffff, 0x0) 17:31:15 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001480)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) [ 958.604874] audit: type=1326 audit(1529688675.541:1858): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29090 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:31:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) accept$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, @local}, &(0x7f0000000340)=0x10) 17:31:16 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) fchmod(0xffffffffffffffff, 0x0) 17:31:16 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001480)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) 17:31:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) prctl$setfpexc(0xc, 0x0) 17:31:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) sched_getaffinity(0x0, 0x8, &(0x7f00000000c0)) 17:31:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000240)={0x0, 0x0, @dev}, &(0x7f0000000300)=0x10, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00') 17:31:16 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001480)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) 17:31:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) accept$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, @local}, &(0x7f0000000340)=0x10) 17:31:16 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) fchmod(0xffffffffffffffff, 0x0) 17:31:16 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) inotify_init() fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:31:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) prctl$setfpexc(0xc, 0x0) 17:31:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) sched_getaffinity(0x0, 0x8, &(0x7f00000000c0)) 17:31:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000001180)) semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f0000000000)) 17:31:16 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000b00)={'bridge0\x00'}) [ 959.547047] audit: type=1326 audit(1529688676.545:1859): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29135 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:31:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000080)}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) fchmod(0xffffffffffffffff, 0x0) 17:31:16 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001480)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) [ 959.663655] audit: type=1326 audit(1529688676.589:1860): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29148 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:31:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000001180)) semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f0000000000)) 17:31:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) sched_getaffinity(0x0, 0x8, &(0x7f00000000c0)) 17:31:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) prctl$setfpexc(0xc, 0x0) 17:31:16 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.current\x00', 0x0, 0x0) 17:31:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000080)}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) fchmod(0xffffffffffffffff, 0x0) 17:31:16 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001480)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) 17:31:17 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000001180)) semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f0000000000)) 17:31:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) accept$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, @local}, &(0x7f0000000340)=0x10) 17:31:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000080)}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) fchmod(0xffffffffffffffff, 0x0) 17:31:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001480)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) 17:31:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x50012}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) fchmod(0xffffffffffffffff, 0x0) 17:31:17 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.current\x00', 0x0, 0x0) 17:31:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) sched_getaffinity(0x0, 0x8, &(0x7f00000000c0)) 17:31:17 executing program 3: recvfrom$inet(0xffffffffffffffff, &(0x7f0000000000)=""/248, 0x20000003, 0x0, 0x0, 0x267) 17:31:17 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x800050609}]}) socket$alg(0x26, 0x5, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0) 17:31:17 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:31:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x50012}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) fchmod(0xffffffffffffffff, 0x0) 17:31:17 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.current\x00', 0x0, 0x0) 17:31:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) prctl$setfpexc(0xc, 0x0) 17:31:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) sched_getaffinity(0x0, 0x8, &(0x7f00000000c0)) 17:31:17 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x800050609}]}) socket$alg(0x26, 0x5, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0) 17:31:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x50012}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) fchmod(0xffffffffffffffff, 0x0) 17:31:17 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.current\x00', 0x0, 0x0) 17:31:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) accept$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, @local}, &(0x7f0000000340)=0x10) 17:31:18 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:31:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) fchmod(0xffffffffffffffff, 0x0) 17:31:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050206}]}) nanosleep(&(0x7f0000000080), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 17:31:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.current\x00', 0x0, 0x0) 17:31:18 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001480)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) [ 961.411161] kauditd_printk_skb: 5 callbacks suppressed [ 961.411182] audit: type=1326 audit(1529688678.409:1866): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29249 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:31:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.current\x00', 0x0, 0x0) [ 961.502286] audit: type=1326 audit(1529688678.451:1867): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29255 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 961.522576] audit: type=1326 audit(1529688678.452:1868): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29251 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:31:18 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:31:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 17:31:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.current\x00', 0x0, 0x0) 17:31:18 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:31:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) prctl$setfpexc(0xc, 0x0) 17:31:18 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) sched_getaffinity(0x0, 0x8, &(0x7f00000000c0)) 17:31:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 17:31:18 executing program 5: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.current\x00', 0x0, 0x0) [ 961.944027] audit: type=1326 audit(1529688678.941:1869): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29284 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:31:19 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) [ 962.037019] audit: type=1326 audit(1529688678.977:1870): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29282 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:31:19 executing program 5: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.current\x00', 0x0, 0x0) 17:31:19 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 17:31:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) fchmod(0xffffffffffffffff, 0x0) 17:31:19 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:31:19 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001480)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) 17:31:19 executing program 5: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.current\x00', 0x0, 0x0) 17:31:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) wait4(0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)) [ 962.501926] audit: type=1326 audit(1529688679.500:1871): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29315 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:31:19 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:31:19 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.current\x00', 0x0, 0x0) [ 962.584196] audit: type=1326 audit(1529688679.557:1872): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29318 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:31:19 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 17:31:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) wait4(0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)) 17:31:19 executing program 3: socket$inet6(0xa, 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:31:19 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) sched_getaffinity(0x0, 0x8, &(0x7f00000000c0)) 17:31:19 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.current\x00', 0x0, 0x0) 17:31:19 executing program 6: r0 = open(&(0x7f0000000100)='./file1\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) 17:31:19 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 17:31:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) wait4(0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)) [ 963.032804] audit: type=1326 audit(1529688680.031:1873): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29349 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:31:20 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.current\x00', 0x0, 0x0) 17:31:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) fchmod(0xffffffffffffffff, 0x0) 17:31:20 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 17:31:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) wait4(0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)) 17:31:20 executing program 3: socket$inet6(0xa, 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:31:20 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000080)}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.current\x00', 0x0, 0x0) 17:31:20 executing program 0: sendto$inet(0xffffffffffffffff, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x0, &(0x7f0000db4ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) 17:31:20 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000080), 0x4) 17:31:20 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000080)}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.current\x00', 0x0, 0x0) [ 963.524952] audit: type=1326 audit(1529688680.523:1874): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29380 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:31:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)) 17:31:20 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 17:31:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)) 17:31:20 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000080)}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.current\x00', 0x0, 0x0) 17:31:20 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000080), 0x4) 17:31:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) wait4(0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)) 17:31:20 executing program 7: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 17:31:20 executing program 3: socket$inet6(0xa, 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:31:21 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:31:21 executing program 4: io_setup(0x0, &(0x7f00000001c0)) 17:31:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) wait4(0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)) 17:31:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x50012}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.current\x00', 0x0, 0x0) 17:31:21 executing program 7: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 17:31:21 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000080), 0x4) 17:31:21 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)) 17:31:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) clone(0x0, &(0x7f0000000280), &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000180)) 17:31:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000340)) quotactl(0x0, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000000c0)) 17:31:21 executing program 7: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 17:31:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x50012}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.current\x00', 0x0, 0x0) 17:31:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) wait4(0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)) 17:31:21 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000080), 0x4) 17:31:21 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)) 17:31:21 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:31:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x50012}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.current\x00', 0x0, 0x0) 17:31:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) clone(0x0, &(0x7f0000000280), &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000180)) 17:31:21 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 17:31:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000340)) quotactl(0x0, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000000c0)) 17:31:21 executing program 1: openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) wait4(0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)) 17:31:21 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)) 17:31:21 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501f9}]}) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000080), 0x4) 17:31:22 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:31:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.current\x00', 0x0, 0x0) 17:31:22 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 17:31:22 executing program 1: openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) wait4(0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)) 17:31:22 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)) 17:31:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501f9}]}) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000080), 0x4) 17:31:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) clone(0x0, &(0x7f0000000280), &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000180)) [ 965.272430] audit: type=1326 audit(1529688682.271:1875): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29492 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:31:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000340)) quotactl(0x0, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000000c0)) 17:31:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:31:22 executing program 1: openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) wait4(0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)) 17:31:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501f9}]}) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000080), 0x4) 17:31:22 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 17:31:22 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)) 17:31:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) clone(0x0, &(0x7f0000000280), &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000180)) 17:31:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000340)) quotactl(0x0, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000000c0)) 17:31:22 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) wait4(0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)) 17:31:22 executing program 6: socket$inet6(0xa, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000080), 0x4) 17:31:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.current\x00', 0x0, 0x0) 17:31:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) clone(0x0, &(0x7f0000000280), &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000180)) 17:31:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 17:31:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:31:23 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) quotactl(0x0, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000000c0)) 17:31:23 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) wait4(0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)) 17:31:23 executing program 6: socket$inet6(0xa, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000080), 0x4) 17:31:23 executing program 0: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)) 17:31:23 executing program 0: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)) 17:31:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 17:31:23 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) wait4(0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)) 17:31:23 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) quotactl(0x0, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000000c0)) 17:31:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) clone(0x0, &(0x7f0000000280), &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000180)) 17:31:23 executing program 6: socket$inet6(0xa, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000080), 0x4) 17:31:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:31:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 17:31:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.current\x00', 0x0, 0x0) 17:31:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) wait4(0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)) 17:31:24 executing program 0: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)) 17:31:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) clone(0x0, &(0x7f0000000280), &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000180)) 17:31:24 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) quotactl(0x0, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000000c0)) 17:31:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 17:31:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:31:24 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000080), 0x4) 17:31:24 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)) [ 967.147852] kauditd_printk_skb: 1 callbacks suppressed [ 967.147872] audit: type=1326 audit(1529688684.146:1877): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29612 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:31:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 17:31:24 executing program 4: socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000340)) quotactl(0x0, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000000c0)) 17:31:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) wait4(0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)) 17:31:24 executing program 2: memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) clone(0x0, &(0x7f0000000280), &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000180)) 17:31:24 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000080), 0x4) 17:31:24 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)) 17:31:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:31:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 17:31:25 executing program 4: socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000340)) quotactl(0x0, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000000c0)) 17:31:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) wait4(0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)) 17:31:25 executing program 2: memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) clone(0x0, &(0x7f0000000280), &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000180)) 17:31:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:31:25 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)) 17:31:25 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000080), 0x4) 17:31:25 executing program 5: symlinkat(&(0x7f0000008ff8)='./file1\x00', 0xffffffffffffffff, &(0x7f0000012ff8)='./file0\x00') 17:31:25 executing program 4: socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000340)) quotactl(0x0, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000000c0)) 17:31:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)) 17:31:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) wait4(0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)) 17:31:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 17:31:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:31:25 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)) socket$inet6(0xa, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000080), 0x4) 17:31:25 executing program 5: setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='dctcp\x00', 0x6) [ 968.345194] audit: type=1326 audit(1529688685.343:1878): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29698 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:31:25 executing program 2: memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) clone(0x0, &(0x7f0000000280), &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000180)) [ 968.440880] audit: type=1326 audit(1529688685.416:1879): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29705 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:31:25 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000340)) quotactl(0x0, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000000c0)) 17:31:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)) 17:31:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) wait4(0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)) 17:31:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), 0x4) 17:31:25 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)) socket$inet6(0xa, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000080), 0x4) 17:31:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)) 17:31:25 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000340)) quotactl(0x0, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000000c0)) 17:31:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) wait4(0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)) 17:31:25 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) clone(0x0, &(0x7f0000000280), &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000180)) 17:31:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)) 17:31:25 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000340)) quotactl(0x0, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000000c0)) 17:31:26 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)) 17:31:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:31:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 17:31:26 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) clone(0x0, &(0x7f0000000280), &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000180)) 17:31:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000340)) quotactl(0x0, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000000c0)) 17:31:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)) socket$inet6(0xa, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000080), 0x4) 17:31:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), 0x4) 17:31:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) wait4(0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)) 17:31:26 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)) [ 969.340659] audit: type=1326 audit(1529688686.339:1880): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29770 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:31:26 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)) 17:31:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000340)) quotactl(0x0, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000000c0)) [ 969.418667] audit: type=1326 audit(1529688686.382:1881): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29767 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 969.438716] audit: type=1326 audit(1529688686.386:1882): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29781 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:31:26 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) clone(0x0, &(0x7f0000000280), &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000180)) 17:31:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), 0x4) 17:31:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000080), 0x4) [ 969.620053] audit: type=1326 audit(1529688686.545:1883): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29789 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:31:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000340)) quotactl(0x0, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000000c0)) 17:31:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000340)) quotactl(0x0, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000000c0)) 17:31:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), 0x4) 17:31:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:31:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000340)) quotactl(0x0, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000000c0)) 17:31:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) clone(0x0, &(0x7f0000000280), &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000180)) 17:31:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000080), 0x4) 17:31:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), 0x4) 17:31:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 17:31:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) wait4(0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)) [ 970.334702] audit: type=1326 audit(1529688687.333:1884): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29828 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:31:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000340)) quotactl(0x0, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000000c0)) [ 970.405104] audit: type=1326 audit(1529688687.364:1885): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29831 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 970.425340] audit: type=1326 audit(1529688687.365:1886): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29825 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:31:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)) 17:31:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) clone(0x0, &(0x7f0000000280), &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000180)) 17:31:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), 0x4) 17:31:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000080), 0x4) 17:31:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000340)) quotactl(0x0, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000000c0)) 17:31:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) clone(0x0, &(0x7f0000000280), &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000180)) 17:31:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), 0x4) 17:31:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) clone(0x0, &(0x7f0000000280), &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000180)) [ 971.069820] device bridge_slave_1 left promiscuous mode [ 971.075784] bridge0: port 2(bridge_slave_1) entered disabled state [ 971.089708] device bridge_slave_0 left promiscuous mode [ 971.095679] bridge0: port 1(bridge_slave_0) entered disabled state [ 971.138917] team0 (unregistering): Port device team_slave_1 removed [ 971.153454] team0 (unregistering): Port device team_slave_0 removed [ 971.165703] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 971.185127] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 971.224731] bond0 (unregistering): Released all slaves 17:31:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) wait4(0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)) 17:31:28 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000080), 0x4) 17:31:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) clone(0x0, &(0x7f0000000280), &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000180)) 17:31:28 executing program 5: socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), 0x4) 17:31:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) sched_setattr(0x0, &(0x7f0000000140), 0x0) 17:31:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000002c0)) 17:31:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) sched_setattr(0x0, &(0x7f0000000140), 0x0) 17:31:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000002c0)) 17:31:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)) 17:31:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) clone(0x0, &(0x7f0000000280), &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000180)) 17:31:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000340)) quotactl(0x0, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000000c0)) 17:31:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) sched_setattr(0x0, &(0x7f0000000140), 0x0) 17:31:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000002c0)) 17:31:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) clone(0x0, &(0x7f0000000280), &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000180)) 17:31:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000002c0)) 17:31:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) sched_setattr(0x0, &(0x7f0000000140), 0x0) [ 972.257438] IPVS: ftp: loaded support on port[0] = 21 17:31:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000080), 0x4) 17:31:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000002c0)) 17:31:29 executing program 1: setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000040)={0x0, 'gre0\x00'}, 0x18) [ 972.451403] kauditd_printk_skb: 7 callbacks suppressed [ 972.451428] audit: type=1326 audit(1529688689.450:1894): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29935 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 973.568663] bridge0: port 1(bridge_slave_0) entered blocking state [ 973.575133] bridge0: port 1(bridge_slave_0) entered disabled state [ 973.582590] device bridge_slave_0 entered promiscuous mode [ 973.619467] bridge0: port 2(bridge_slave_1) entered blocking state [ 973.626351] bridge0: port 2(bridge_slave_1) entered disabled state [ 973.633845] device bridge_slave_1 entered promiscuous mode [ 973.670522] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 973.707549] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 973.812765] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 973.853347] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 974.022239] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 974.029563] team0: Port device team_slave_0 added [ 974.066292] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 974.073635] team0: Port device team_slave_1 added [ 974.110120] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 974.149891] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 974.189819] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 974.230808] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 974.613436] bridge0: port 2(bridge_slave_1) entered blocking state [ 974.619911] bridge0: port 2(bridge_slave_1) entered forwarding state [ 974.626729] bridge0: port 1(bridge_slave_0) entered blocking state [ 974.633193] bridge0: port 1(bridge_slave_0) entered forwarding state [ 974.641046] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 975.455452] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 976.735254] 8021q: adding VLAN 0 to HW filter on device bond0 [ 976.869376] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 976.999932] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 977.006310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 977.014644] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 977.140172] 8021q: adding VLAN 0 to HW filter on device team0 [ 978.207788] audit: type=1326 audit(1529688695.206:1895): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=30206 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:31:35 executing program 5: socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), 0x4) 17:31:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000080), 0x4) 17:31:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) sched_setattr(0x0, &(0x7f0000000140), 0x0) 17:31:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000340)) quotactl(0x0, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000000c0)) 17:31:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) clone(0x0, &(0x7f0000000280), &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000180)) 17:31:35 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r0, 0x5423, &(0x7f0000000000)) 17:31:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000002c0)) 17:31:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in=@multicast2}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000000)=0xe8) keyctl$get_persistent(0x16, 0x0, 0x0) 17:31:35 executing program 5: socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), 0x4) 17:31:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) sched_setattr(0x0, &(0x7f0000000140), 0x0) 17:31:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) sched_setattr(0x0, &(0x7f0000000140), 0x0) [ 978.755514] device bridge_slave_1 left promiscuous mode [ 978.761565] bridge0: port 2(bridge_slave_1) entered disabled state [ 978.840688] device bridge_slave_0 left promiscuous mode [ 978.846672] bridge0: port 1(bridge_slave_0) entered disabled state 17:31:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) accept(0xffffffffffffff9c, &(0x7f00000001c0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000240)=0x80) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x4) 17:31:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000180)={0x0, @in6={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}}}, &(0x7f00000000c0)=0x84) 17:31:35 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), 0x4) 17:31:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) pselect6(0x40, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300), &(0x7f00000004c0), &(0x7f0000000680)={&(0x7f0000000640), 0x8}) 17:31:36 executing program 7: pipe2(&(0x7f0000000040), 0x0) sched_setattr(0x0, &(0x7f0000000140), 0x0) 17:31:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000002c0)) [ 979.052043] team0 (unregistering): Port device team_slave_1 removed [ 979.110076] team0 (unregistering): Port device team_slave_0 removed 17:31:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) clone(0x0, &(0x7f0000000280), &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000180)) 17:31:36 executing program 6: r0 = socket$unix(0x1, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x2c, &(0x7f0000000000)=0xffff, 0x4) setsockopt$sock_int(r0, 0x1, 0x2c, &(0x7f0000000100), 0x4) setsockopt$sock_int(r0, 0x1, 0x2c, &(0x7f00000000c0), 0xae) 17:31:36 executing program 7: pipe2(&(0x7f0000000040), 0x0) sched_setattr(0x0, &(0x7f0000000140), 0x0) [ 979.157088] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 979.225349] bond0 (unregistering): Releasing backup interface bond_slave_0 17:31:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) accept(0xffffffffffffff9c, &(0x7f00000000c0)=@nfc, &(0x7f0000000140)=0x80) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000380)={0xffffffffffffffff, &(0x7f0000000300), &(0x7f0000000340)=""/55}, 0x18) 17:31:36 executing program 7: pipe2(&(0x7f0000000040), 0x0) sched_setattr(0x0, &(0x7f0000000140), 0x0) [ 979.389507] bond0 (unregistering): Released all slaves 17:31:36 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) sched_setattr(0x0, &(0x7f0000000140), 0x0) 17:31:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) accept(0xffffffffffffff9c, &(0x7f00000000c0)=@nfc, &(0x7f0000000140)=0x80) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000380)={0xffffffffffffffff, &(0x7f0000000300), &(0x7f0000000340)=""/55}, 0x18) 17:31:36 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) sched_setattr(0x0, &(0x7f0000000140), 0x0) [ 979.856957] IPVS: ftp: loaded support on port[0] = 21 [ 979.871489] IPVS: ftp: loaded support on port[0] = 21 [ 979.886334] IPVS: ftp: loaded support on port[0] = 21 [ 979.890071] IPVS: ftp: loaded support on port[0] = 21 [ 979.916857] IPVS: ftp: loaded support on port[0] = 21 17:31:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) accept(0xffffffffffffff9c, &(0x7f00000000c0)=@nfc, &(0x7f0000000140)=0x80) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000380)={0xffffffffffffffff, &(0x7f0000000300), &(0x7f0000000340)=""/55}, 0x18) [ 980.063182] syz-executor2: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 980.074754] syz-executor2 cpuset=/ mems_allowed=0 [ 980.079780] CPU: 0 PID: 30229 Comm: syz-executor2 Not tainted 4.17.0+ #9 [ 980.086659] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 980.096338] Call Trace: [ 980.098985] dump_stack+0x185/0x1d0 [ 980.102851] warn_alloc+0x430/0x690 [ 980.106663] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 980.111629] ? __msan_poison_alloca+0x15c/0x1d0 [ 980.116441] copy_process+0x778/0x9be0 [ 980.120407] ? __msan_poison_alloca+0x15c/0x1d0 [ 980.125137] ? handle_mm_fault+0x74eb/0x7ed0 [ 980.129631] ? handle_mm_fault+0x74eb/0x7ed0 [ 980.134113] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 980.139546] ? lru_cache_add_active_or_unevictable+0x3da/0x5f0 [ 980.145947] ? handle_mm_fault+0x1eb0/0x7ed0 [ 980.150490] ? __msan_poison_alloca+0x141/0x1d0 [ 980.155205] _do_fork+0x353/0xf60 [ 980.158682] __x64_sys_clone+0x15e/0x1b0 [ 980.162758] ? __ia32_sys_vfork+0x70/0x70 [ 980.166915] do_syscall_64+0x15b/0x230 [ 980.170818] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 980.176098] RIP: 0033:0x458429 [ 980.179288] RSP: 002b:00007fff6f379518 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 980.187013] RAX: ffffffffffffffda RBX: 00007fff6f3795d0 RCX: 0000000000458429 [ 980.194296] RDX: 434f503a30656c69 RSI: 0000000000a3ffb0 RDI: 0000000030000000 [ 980.201588] RBP: 0000000000000000 R08: 000000000000001a R09: 000000000000001a [ 980.208861] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000411910 [ 980.216133] R13: 00000000004119a0 R14: 0000000000000000 R15: 0000000000000000 [ 980.223807] Mem-Info: [ 980.226339] active_anon:130682 inactive_anon:76 isolated_anon:0 [ 980.226339] active_file:912 inactive_file:921 isolated_file:31 [ 980.226339] unevictable:0 dirty:22 writeback:0 unstable:0 [ 980.226339] slab_reclaimable:3319 slab_unreclaimable:9452 [ 980.226339] mapped:67180 shmem:84 pagetables:1027 bounce:0 [ 980.226339] free:33353 free_pcp:374 free_cma:0 [ 980.259544] Node 0 active_anon:522728kB inactive_anon:304kB active_file:3648kB inactive_file:3560kB unevictable:0kB isolated(anon):0kB isolated(file):12kB mapped:268256kB dirty:88kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 241664kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 980.287580] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 980.313859] lowmem_reserve[]: 0 2817 7244 7244 [ 980.318589] Node 0 DMA32 free:65836kB min:26224kB low:32780kB high:39336kB active_anon:233112kB inactive_anon:12kB active_file:1280kB inactive_file:1400kB unevictable:0kB writepending:64kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1472kB pagetables:1188kB bounce:0kB free_pcp:788kB local_pcp:52kB free_cma:0kB [ 980.348525] lowmem_reserve[]: 0 0 4426 4426 [ 980.353040] Node 0 Normal free:54696kB min:41208kB low:51508kB high:61808kB active_anon:289616kB inactive_anon:292kB active_file:1824kB inactive_file:1472kB unevictable:0kB writepending:24kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7808kB pagetables:2920kB bounce:0kB free_pcp:752kB local_pcp:28kB free_cma:0kB [ 980.382439] lowmem_reserve[]: 0 0 0 0 [ 980.386347] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 980.399808] Node 0 DMA32: 450*4kB (UM) 2542*8kB (UM) 979*16kB (UM) 139*32kB (UM) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 4*2048kB (H) 4*4096kB (H) = 66824kB [ 980.414280] Node 0 Normal: 3338*4kB (UMEH) 2123*8kB (UMEH) 661*16kB (UMEH) 75*32kB (UMEH) 15*64kB (UMH) 9*128kB (UH) 5*256kB (UH) 1*512kB (U) 0*1024kB 2*2048kB (H) 1*4096kB (M) = 55408kB [ 980.431484] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 980.440134] 1267 total pagecache pages [ 980.444082] 0 pages in swap cache [ 980.447611] Swap cache stats: add 0, delete 0, find 0/0 [ 980.453030] Free swap = 0kB [ 980.456111] Total swap = 0kB [ 980.459186] 1965969 pages RAM [ 980.462339] 0 pages HighMem/MovableOnly [ 980.466361] 106316 pages reserved 17:31:37 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) sched_setattr(0x0, &(0x7f0000000140), 0x0) [ 981.844177] device bridge_slave_1 left promiscuous mode [ 981.850099] bridge0: port 2(bridge_slave_1) entered disabled state [ 981.863074] device bridge_slave_0 left promiscuous mode [ 981.868868] bridge0: port 1(bridge_slave_0) entered disabled state [ 981.889782] device bridge_slave_1 left promiscuous mode [ 981.895529] bridge0: port 2(bridge_slave_1) entered disabled state [ 981.908116] device bridge_slave_0 left promiscuous mode [ 981.914020] bridge0: port 1(bridge_slave_0) entered disabled state [ 981.928731] device bridge_slave_1 left promiscuous mode [ 981.935321] bridge0: port 2(bridge_slave_1) entered disabled state [ 981.948005] device bridge_slave_0 left promiscuous mode [ 981.953745] bridge0: port 1(bridge_slave_0) entered disabled state [ 981.966726] device bridge_slave_1 left promiscuous mode [ 981.972657] bridge0: port 2(bridge_slave_1) entered disabled state [ 981.985003] device bridge_slave_0 left promiscuous mode [ 981.990748] bridge0: port 1(bridge_slave_0) entered disabled state [ 982.004727] device bridge_slave_1 left promiscuous mode [ 982.010485] bridge0: port 2(bridge_slave_1) entered disabled state [ 982.030483] device bridge_slave_0 left promiscuous mode [ 982.036273] bridge0: port 1(bridge_slave_0) entered disabled state [ 982.065485] device bridge_slave_1 left promiscuous mode [ 982.071266] bridge0: port 2(bridge_slave_1) entered disabled state [ 982.141394] device bridge_slave_0 left promiscuous mode [ 982.147587] bridge0: port 1(bridge_slave_0) entered disabled state [ 982.339881] team0 (unregistering): Port device team_slave_1 removed [ 982.351739] team0 (unregistering): Port device team_slave_0 removed [ 982.363758] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 982.380677] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 982.413528] bond0 (unregistering): Released all slaves [ 982.434355] team0 (unregistering): Port device team_slave_1 removed [ 982.446545] team0 (unregistering): Port device team_slave_0 removed [ 982.458447] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 982.474284] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 982.506214] bond0 (unregistering): Released all slaves [ 982.526267] team0 (unregistering): Port device team_slave_1 removed [ 982.538500] team0 (unregistering): Port device team_slave_0 removed [ 982.550558] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 982.568595] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 982.598838] bond0 (unregistering): Released all slaves [ 982.619301] team0 (unregistering): Port device team_slave_1 removed [ 982.631714] team0 (unregistering): Port device team_slave_0 removed [ 982.644100] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 982.661713] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 982.694576] bond0 (unregistering): Released all slaves [ 982.716143] team0 (unregistering): Port device team_slave_1 removed [ 982.726393] team0 (unregistering): Port device team_slave_0 removed [ 982.736322] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 982.753375] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 982.778210] bond0 (unregistering): Released all slaves [ 982.800806] team0 (unregistering): Port device team_slave_1 removed [ 982.811139] team0 (unregistering): Port device team_slave_0 removed [ 982.821210] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 982.838180] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 982.864305] bond0 (unregistering): Released all slaves [ 983.347949] IPVS: ftp: loaded support on port[0] = 21 [ 984.305217] IPVS: ftp: loaded support on port[0] = 21 [ 984.339950] IPVS: ftp: loaded support on port[0] = 21 [ 984.354340] IPVS: ftp: loaded support on port[0] = 21 [ 984.368309] IPVS: ftp: loaded support on port[0] = 21 [ 984.384091] IPVS: ftp: loaded support on port[0] = 21 [ 986.223873] bridge0: port 1(bridge_slave_0) entered blocking state [ 986.230695] bridge0: port 1(bridge_slave_0) entered disabled state [ 986.264036] device bridge_slave_0 entered promiscuous mode [ 986.388020] bridge0: port 2(bridge_slave_1) entered blocking state [ 986.394545] bridge0: port 2(bridge_slave_1) entered disabled state [ 986.425712] device bridge_slave_1 entered promiscuous mode [ 986.568239] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 986.715220] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 987.076516] bridge0: port 1(bridge_slave_0) entered blocking state [ 987.083047] bridge0: port 1(bridge_slave_0) entered disabled state [ 987.101741] device bridge_slave_0 entered promiscuous mode [ 987.153344] bridge0: port 1(bridge_slave_0) entered blocking state [ 987.160060] bridge0: port 1(bridge_slave_0) entered disabled state [ 987.187153] device bridge_slave_0 entered promiscuous mode [ 987.235054] bridge0: port 1(bridge_slave_0) entered blocking state [ 987.241713] bridge0: port 1(bridge_slave_0) entered disabled state [ 987.263875] device bridge_slave_0 entered promiscuous mode [ 987.274897] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 987.288093] bridge0: port 2(bridge_slave_1) entered blocking state [ 987.294658] bridge0: port 2(bridge_slave_1) entered disabled state [ 987.319448] device bridge_slave_1 entered promiscuous mode [ 987.332035] bridge0: port 2(bridge_slave_1) entered blocking state [ 987.338536] bridge0: port 2(bridge_slave_1) entered disabled state [ 987.360215] device bridge_slave_1 entered promiscuous mode [ 987.374748] bridge0: port 1(bridge_slave_0) entered blocking state [ 987.381279] bridge0: port 1(bridge_slave_0) entered disabled state [ 987.412160] device bridge_slave_0 entered promiscuous mode [ 987.425385] bridge0: port 1(bridge_slave_0) entered blocking state [ 987.431887] bridge0: port 1(bridge_slave_0) entered disabled state [ 987.446215] device bridge_slave_0 entered promiscuous mode [ 987.461632] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 987.476639] bridge0: port 2(bridge_slave_1) entered blocking state [ 987.483227] bridge0: port 2(bridge_slave_1) entered disabled state [ 987.517036] device bridge_slave_1 entered promiscuous mode [ 987.533403] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 987.541534] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 987.552267] bridge0: port 2(bridge_slave_1) entered blocking state [ 987.558767] bridge0: port 2(bridge_slave_1) entered disabled state [ 987.598550] device bridge_slave_1 entered promiscuous mode [ 987.616800] bridge0: port 2(bridge_slave_1) entered blocking state [ 987.623335] bridge0: port 2(bridge_slave_1) entered disabled state [ 987.652172] device bridge_slave_1 entered promiscuous mode [ 987.668087] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 987.677694] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 987.692027] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 987.700903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 987.731788] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 987.763939] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 987.786199] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 987.840388] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 987.847684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 987.888186] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 987.915808] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 987.965838] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 988.231630] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 988.262619] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 988.318200] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 988.351611] team0: Port device team_slave_0 added [ 988.376618] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 988.402278] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 988.416280] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 988.462504] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 988.480154] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 988.490668] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 988.512912] team0: Port device team_slave_1 added [ 988.574599] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 988.596687] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 988.610320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 988.639895] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 988.650100] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 988.659536] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 988.667620] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 988.697732] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 988.704931] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 988.714052] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 988.738274] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 988.745361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 988.768848] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 988.776137] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 988.822185] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 988.829357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 988.850560] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 988.859513] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 988.902825] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 988.909952] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 988.919849] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 988.943606] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 988.954693] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 988.962714] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 988.985082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 989.008600] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 989.043742] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 989.078599] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 989.086241] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 989.103536] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 989.125307] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 989.141464] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 989.335921] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 989.346449] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 989.359265] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 989.391498] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 989.408688] team0: Port device team_slave_0 added [ 989.447237] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 989.459214] team0: Port device team_slave_0 added [ 989.466406] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 989.480411] team0: Port device team_slave_0 added [ 989.492390] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 989.512160] team0: Port device team_slave_0 added [ 989.568306] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 989.584787] team0: Port device team_slave_1 added [ 989.608293] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 989.630826] team0: Port device team_slave_1 added [ 989.667231] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 989.685771] team0: Port device team_slave_1 added [ 989.699662] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 989.720272] team0: Port device team_slave_1 added [ 989.733343] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 989.763355] team0: Port device team_slave_0 added [ 989.779527] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 989.786653] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 989.799092] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 989.825111] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 989.837522] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 989.853291] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 989.878722] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 989.892459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 989.922946] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 989.944661] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 989.952154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 989.973597] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 989.989590] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 989.999218] team0: Port device team_slave_1 added [ 990.008173] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 990.018350] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 990.030277] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 990.051158] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 990.058617] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 990.071927] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 990.108586] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 990.115907] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 990.128555] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 990.155959] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 990.165866] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 990.178871] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 990.213705] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 990.223044] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 990.254904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 990.293189] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 990.302136] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 990.311767] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 990.334648] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 990.363804] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 990.380859] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 990.391832] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 990.399379] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 990.407858] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 990.430082] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 990.444038] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 990.451833] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 990.464284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 990.483772] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 990.505183] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 990.523227] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 990.532261] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 990.540798] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 990.559427] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 990.567902] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 990.594558] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 990.616494] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 990.624825] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 990.635824] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 990.683092] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 990.690927] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 990.716276] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 990.754072] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 990.761629] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 990.784506] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 990.928557] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 990.936360] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 990.949257] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 991.442706] bridge0: port 2(bridge_slave_1) entered blocking state [ 991.449220] bridge0: port 2(bridge_slave_1) entered forwarding state [ 991.456268] bridge0: port 1(bridge_slave_0) entered blocking state [ 991.462743] bridge0: port 1(bridge_slave_0) entered forwarding state [ 991.488227] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 991.615180] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 992.443599] bridge0: port 2(bridge_slave_1) entered blocking state [ 992.450225] bridge0: port 2(bridge_slave_1) entered forwarding state [ 992.457197] bridge0: port 1(bridge_slave_0) entered blocking state [ 992.463703] bridge0: port 1(bridge_slave_0) entered forwarding state [ 992.501951] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 992.517628] bridge0: port 2(bridge_slave_1) entered blocking state [ 992.524218] bridge0: port 2(bridge_slave_1) entered forwarding state [ 992.531158] bridge0: port 1(bridge_slave_0) entered blocking state [ 992.537618] bridge0: port 1(bridge_slave_0) entered forwarding state [ 992.546200] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 992.578755] bridge0: port 2(bridge_slave_1) entered blocking state [ 992.585261] bridge0: port 2(bridge_slave_1) entered forwarding state [ 992.592161] bridge0: port 1(bridge_slave_0) entered blocking state [ 992.598717] bridge0: port 1(bridge_slave_0) entered forwarding state [ 992.648262] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 992.657214] bridge0: port 2(bridge_slave_1) entered blocking state [ 992.663729] bridge0: port 2(bridge_slave_1) entered forwarding state [ 992.670579] bridge0: port 1(bridge_slave_0) entered blocking state [ 992.677145] bridge0: port 1(bridge_slave_0) entered forwarding state [ 992.685591] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 992.692497] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 992.707122] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 992.722181] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 992.729920] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 992.756794] bridge0: port 2(bridge_slave_1) entered blocking state [ 992.763290] bridge0: port 2(bridge_slave_1) entered forwarding state [ 992.770169] bridge0: port 1(bridge_slave_0) entered blocking state [ 992.776638] bridge0: port 1(bridge_slave_0) entered forwarding state [ 992.817837] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 993.695219] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 998.616452] 8021q: adding VLAN 0 to HW filter on device bond0 [ 999.271851] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 999.321620] 8021q: adding VLAN 0 to HW filter on device bond0 [ 999.434240] 8021q: adding VLAN 0 to HW filter on device bond0 [ 999.582328] 8021q: adding VLAN 0 to HW filter on device bond0 [ 999.678596] 8021q: adding VLAN 0 to HW filter on device bond0 [ 999.813925] 8021q: adding VLAN 0 to HW filter on device bond0 [ 999.986409] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 999.992799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1000.003619] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1000.115109] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1000.256554] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1000.392504] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1000.452034] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1000.559193] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1000.787057] 8021q: adding VLAN 0 to HW filter on device team0 [ 1000.802214] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1000.812519] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1000.821896] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1001.002397] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1001.015325] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1001.028623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1001.470656] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1001.477083] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1001.484393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1001.504128] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1001.511469] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1001.517899] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1001.525660] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1001.533790] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1001.558602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1003.105373] device bridge_slave_1 left promiscuous mode [ 1003.111295] bridge0: port 2(bridge_slave_1) entered disabled state [ 1003.147146] device bridge_slave_0 left promiscuous mode [ 1003.153048] bridge0: port 1(bridge_slave_0) entered disabled state [ 1003.199561] team0 (unregistering): Port device team_slave_1 removed [ 1003.210696] team0 (unregistering): Port device team_slave_0 removed [ 1003.220717] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1003.241736] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1003.266892] bond0 (unregistering): Released all slaves 17:32:00 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f00000000c0)) timer_gettime(0x0, &(0x7f0000000100)) 17:32:00 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000939000)) 17:32:00 executing program 3: listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000002c0)) [ 1003.510033] audit: type=1326 audit(1529688720.508:1896): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=31547 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 1003.698077] IPVS: ftp: loaded support on port[0] = 21 [ 1003.892409] IPVS: ftp: loaded support on port[0] = 21 [ 1003.908866] IPVS: ftp: loaded support on port[0] = 21 17:32:01 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000040), 0x0) sched_setattr(0x0, &(0x7f0000000140), 0x0) 17:32:01 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), 0x4) 17:32:01 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) accept(0xffffffffffffff9c, &(0x7f00000000c0)=@nfc, &(0x7f0000000140)=0x80) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000380)={0xffffffffffffffff, &(0x7f0000000300), &(0x7f0000000340)=""/55}, 0x18) 17:32:01 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000100)=""/164) 17:32:01 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000040), 0x0) sched_setattr(0x0, &(0x7f0000000140), 0x0) 17:32:01 executing program 2: prctl$getreaper(0x0, &(0x7f0000987ff8)) 17:32:01 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000040), 0x0) sched_setattr(0x0, &(0x7f0000000140), 0x0) 17:32:01 executing program 2: mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) [ 1004.814100] syz-executor0: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1004.825731] syz-executor0 cpuset=/ mems_allowed=0 [ 1004.830777] CPU: 1 PID: 31558 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 1004.837672] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1004.847078] Call Trace: [ 1004.849747] dump_stack+0x185/0x1d0 [ 1004.853447] warn_alloc+0x430/0x690 [ 1004.857180] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1004.862121] ? __msan_poison_alloca+0x15c/0x1d0 [ 1004.867007] copy_process+0x778/0x9be0 [ 1004.870968] ? prepare_exit_to_usermode+0x271/0x3a0 [ 1004.876172] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 1004.881629] ? do_signal+0x49f/0x1d20 [ 1004.885536] ? __msan_poison_alloca+0x141/0x1d0 [ 1004.890583] _do_fork+0x353/0xf60 [ 1004.894143] __x64_sys_clone+0x15e/0x1b0 [ 1004.898273] ? __ia32_sys_vfork+0x70/0x70 [ 1004.902480] do_syscall_64+0x15b/0x230 [ 1004.906452] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1004.911683] RIP: 0033:0x41f8b9 [ 1004.914904] RSP: 002b:0000000000a3fc00 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1004.922667] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000041f8b9 [ 1004.929987] RDX: 0000000000a3fc0c RSI: 0000000000000000 RDI: 0000000000100011 [ 1004.937489] RBP: 0000000000a3fdb0 R08: 0000000000a44a60 R09: 0000000000000027 [ 1004.944982] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000411910 [ 1004.952309] R13: 00000000004119a0 R14: 0000000000000000 R15: 0000000000000000 [ 1004.960165] Mem-Info: [ 1004.962750] active_anon:127448 inactive_anon:78 isolated_anon:0 [ 1004.962750] active_file:1518 inactive_file:1391 isolated_file:38 [ 1004.962750] unevictable:0 dirty:2 writeback:0 unstable:0 [ 1004.962750] slab_reclaimable:3301 slab_unreclaimable:9048 [ 1004.962750] mapped:59546 shmem:84 pagetables:1050 bounce:0 [ 1004.962750] free:27985 free_pcp:422 free_cma:0 17:32:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000100)=""/164) [ 1004.996748] Node 0 active_anon:509676kB inactive_anon:312kB active_file:5548kB inactive_file:5552kB unevictable:0kB isolated(anon):0kB isolated(file):152kB mapped:240156kB dirty:8kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 241664kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1005.025338] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1005.051780] lowmem_reserve[]: 0 2817 7244 7244 [ 1005.056521] Node 0 DMA32 free:50092kB min:26224kB low:32780kB high:39336kB active_anon:223508kB inactive_anon:16kB active_file:1984kB inactive_file:3704kB unevictable:0kB writepending:8kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1472kB pagetables:1340kB bounce:0kB free_pcp:844kB local_pcp:124kB free_cma:0kB [ 1005.085879] lowmem_reserve[]: 0 0 4426 4426 [ 1005.090416] Node 0 Normal free:39044kB min:41208kB low:51508kB high:61808kB active_anon:286400kB inactive_anon:296kB active_file:3224kB inactive_file:2140kB unevictable:0kB writepending:0kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7936kB pagetables:2860kB bounce:0kB free_pcp:952kB local_pcp:232kB free_cma:0kB [ 1005.120244] lowmem_reserve[]: 0 0 0 0 [ 1005.124205] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 1005.137745] Node 0 DMA32: 332*4kB (UM) 1739*8kB (M) 473*16kB (UM) 34*32kB (UM) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 4*2048kB (H) 4*4096kB (H) = 48472kB [ 1005.152219] Node 0 Normal: 2192*4kB (UME) 1534*8kB (UME) 512*16kB (UME) 45*32kB (UM) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 1*2048kB (H) 0*4096kB = 32720kB [ 1005.166722] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1005.175451] 2423 total pagecache pages [ 1005.179430] 0 pages in swap cache [ 1005.183030] Swap cache stats: add 0, delete 0, find 0/0 [ 1005.188514] Free swap = 0kB [ 1005.191648] Total swap = 0kB [ 1005.194758] 1965969 pages RAM [ 1005.198004] 0 pages HighMem/MovableOnly [ 1005.202084] 106316 pages reserved [ 1005.206356] udevd: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1005.217132] udevd cpuset=/ mems_allowed=0 [ 1005.221445] CPU: 0 PID: 11355 Comm: udevd Not tainted 4.17.0+ #9 [ 1005.227627] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1005.237107] Call Trace: [ 1005.239753] dump_stack+0x185/0x1d0 [ 1005.243424] warn_alloc+0x430/0x690 [ 1005.247201] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1005.252152] ? __msan_poison_alloca+0x15c/0x1d0 [ 1005.256928] copy_process+0x778/0x9be0 [ 1005.260857] ? expand_files+0x5b/0xe00 [ 1005.264821] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1005.270248] ? expand_files+0xa6/0xe00 [ 1005.274315] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 1005.279741] ? find_next_zero_bit+0x12b/0x2f0 [ 1005.284322] ? __msan_poison_alloca+0x141/0x1d0 [ 1005.289083] _do_fork+0x353/0xf60 [ 1005.292621] __x64_sys_clone+0x15e/0x1b0 [ 1005.296757] ? __ia32_sys_vfork+0x70/0x70 [ 1005.300968] do_syscall_64+0x15b/0x230 [ 1005.304925] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1005.310162] RIP: 0033:0x7f1b320b7f46 [ 1005.313899] RSP: 002b:00007fffd40d07a0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1005.321660] RAX: ffffffffffffffda RBX: 00007fffd40d07a0 RCX: 00007f1b320b7f46 [ 1005.328977] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 1005.336286] RBP: 00007fffd40d0800 R08: 0000000000002c5b R09: 0000000000002c5b [ 1005.343786] R10: 00007f1b329d4a70 R11: 0000000000000246 R12: 0000000000000000 [ 1005.351074] R13: 00007fffd40d07c0 R14: 0000000000000005 R15: 0000000000000005 [ 1005.425403] syz-executor1: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1005.437056] syz-executor1 cpuset=syz1 mems_allowed=0 [ 1005.442383] CPU: 1 PID: 30284 Comm: syz-executor1 Not tainted 4.17.0+ #9 [ 1005.449268] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1005.458675] Call Trace: [ 1005.461359] dump_stack+0x185/0x1d0 [ 1005.465071] warn_alloc+0x430/0x690 [ 1005.468955] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1005.473874] ? __msan_poison_alloca+0x15c/0x1d0 [ 1005.478584] copy_process+0x778/0x9be0 [ 1005.482493] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 1005.487964] ? ptep_set_access_flags+0x10e/0x1d0 [ 1005.492751] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1005.498253] ? handle_mm_fault+0x1eb0/0x7ed0 [ 1005.502695] ? __msan_poison_alloca+0x141/0x1d0 [ 1005.507408] _do_fork+0x353/0xf60 [ 1005.510886] __x64_sys_clone+0x15e/0x1b0 [ 1005.514971] ? __ia32_sys_vfork+0x70/0x70 [ 1005.519152] do_syscall_64+0x15b/0x230 [ 1005.523061] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1005.528262] RIP: 0033:0x45414a [ 1005.531452] RSP: 002b:0000000000a3ea70 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1005.539177] RAX: ffffffffffffffda RBX: 0000000000a3ea70 RCX: 000000000045414a [ 1005.546563] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 1005.553837] RBP: 0000000000a3eab0 R08: 0000000000000001 R09: 0000000002989940 [ 1005.561118] R10: 0000000002989c10 R11: 0000000000000246 R12: 0000000000000001 [ 1005.568419] R13: 0000000000000000 R14: 0000000000000000 R15: 00000000007024c0 17:32:02 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) sched_setattr(0x0, &(0x7f0000000140), 0x0) [ 1005.811957] IPVS: ftp: loaded support on port[0] = 21 [ 1005.847473] IPVS: ftp: loaded support on port[0] = 21 17:32:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040), 0x0) 17:32:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000100)=""/164) [ 1006.341869] IPVS: ftp: loaded support on port[0] = 21 [ 1006.873705] device bridge_slave_1 left promiscuous mode [ 1006.875943] IPVS: ftp: loaded support on port[0] = 21 [ 1006.879507] bridge0: port 2(bridge_slave_1) entered disabled state [ 1006.964100] device bridge_slave_0 left promiscuous mode [ 1006.969888] bridge0: port 1(bridge_slave_0) entered disabled state [ 1006.979096] IPVS: ftp: loaded support on port[0] = 21 [ 1007.003763] device bridge_slave_1 left promiscuous mode [ 1007.009605] bridge0: port 2(bridge_slave_1) entered disabled state [ 1007.044172] device bridge_slave_0 left promiscuous mode [ 1007.050102] bridge0: port 1(bridge_slave_0) entered disabled state [ 1007.075920] device bridge_slave_1 left promiscuous mode [ 1007.081836] bridge0: port 2(bridge_slave_1) entered disabled state [ 1007.107057] device bridge_slave_0 left promiscuous mode [ 1007.112833] bridge0: port 1(bridge_slave_0) entered disabled state [ 1007.129734] device bridge_slave_1 left promiscuous mode [ 1007.135559] bridge0: port 2(bridge_slave_1) entered disabled state [ 1007.148136] device bridge_slave_0 left promiscuous mode [ 1007.153922] bridge0: port 1(bridge_slave_0) entered disabled state [ 1007.166758] device bridge_slave_1 left promiscuous mode [ 1007.172565] bridge0: port 2(bridge_slave_1) entered disabled state [ 1007.185126] device bridge_slave_0 left promiscuous mode [ 1007.190923] bridge0: port 1(bridge_slave_0) entered disabled state [ 1007.339113] team0 (unregistering): Port device team_slave_1 removed [ 1007.352329] team0 (unregistering): Port device team_slave_0 removed [ 1007.363958] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1007.380665] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1007.411324] bond0 (unregistering): Released all slaves [ 1007.432492] team0 (unregistering): Port device team_slave_1 removed [ 1007.444835] team0 (unregistering): Port device team_slave_0 removed [ 1007.457285] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1007.473602] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1007.505491] bond0 (unregistering): Released all slaves [ 1007.527951] team0 (unregistering): Port device team_slave_1 removed [ 1007.540134] team0 (unregistering): Port device team_slave_0 removed [ 1007.552476] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1007.568383] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1007.600167] bond0 (unregistering): Released all slaves [ 1007.620422] team0 (unregistering): Port device team_slave_1 removed [ 1007.633021] team0 (unregistering): Port device team_slave_0 removed [ 1007.644822] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1007.661533] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1007.695622] bond0 (unregistering): Released all slaves [ 1007.717075] team0 (unregistering): Port device team_slave_1 removed [ 1007.729310] team0 (unregistering): Port device team_slave_0 removed [ 1007.741954] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1007.758512] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1007.791364] bond0 (unregistering): Released all slaves [ 1008.977615] IPVS: ftp: loaded support on port[0] = 21 [ 1009.444119] sh: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1009.454588] sh cpuset=/ mems_allowed=0 [ 1009.458640] CPU: 0 PID: 31723 Comm: sh Not tainted 4.17.0+ #9 [ 1009.464574] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1009.473083] sh: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1009.473955] Call Trace: [ 1009.474007] dump_stack+0x185/0x1d0 [ 1009.474049] warn_alloc+0x430/0x690 [ 1009.484417] sh cpuset= [ 1009.486989] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1009.487062] ? __msan_poison_alloca+0x15c/0x1d0 [ 1009.490684] / [ 1009.494346] copy_process+0x778/0x9be0 [ 1009.496902] mems_allowed=0 [ 1009.501720] ? kmsan_set_origin_inline+0x6b/0x120 [ 1009.501755] ? __msan_poison_alloca+0x15c/0x1d0 [ 1009.524454] ? cp_new_stat+0x327/0x9b0 [ 1009.528396] ? __msan_poison_alloca+0x141/0x1d0 [ 1009.533139] _do_fork+0x353/0xf60 [ 1009.536623] __x64_sys_clone+0x15e/0x1b0 [ 1009.540698] ? __ia32_sys_vfork+0x70/0x70 [ 1009.544858] do_syscall_64+0x15b/0x230 [ 1009.548769] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1009.553972] RIP: 0033:0x7fc2184ccf46 [ 1009.557699] RSP: 002b:00007fffef135780 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1009.565430] RAX: ffffffffffffffda RBX: 00007fffef135780 RCX: 00007fc2184ccf46 [ 1009.572721] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 1009.580002] RBP: 00007fffef1357c0 R08: 0000000000000000 R09: 000000000000001a [ 1009.587290] R10: 00007fc2189c39d0 R11: 0000000000000246 R12: 0000000000000000 [ 1009.594657] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1009.602007] CPU: 1 PID: 31726 Comm: sh Not tainted 4.17.0+ #9 [ 1009.602186] warn_alloc_show_mem: 2 callbacks suppressed [ 1009.602193] Mem-Info: [ 1009.607918] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1009.607931] Call Trace: [ 1009.607979] dump_stack+0x185/0x1d0 [ 1009.608022] warn_alloc+0x430/0x690 [ 1009.613448] active_anon:127236 inactive_anon:77 isolated_anon:0 [ 1009.613448] active_file:1559 inactive_file:6141 isolated_file:64 [ 1009.613448] unevictable:0 dirty:44 writeback:0 unstable:0 [ 1009.613448] slab_reclaimable:3295 slab_unreclaimable:8388 [ 1009.613448] mapped:64810 shmem:83 pagetables:1016 bounce:0 [ 1009.613448] free:23248 free_pcp:261 free_cma:0 [ 1009.615818] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1009.615877] ? __msan_poison_alloca+0x15c/0x1d0 [ 1009.625275] Node 0 active_anon:508944kB inactive_anon:308kB active_file:6236kB inactive_file:24564kB unevictable:0kB isolated(anon):0kB isolated(file):256kB mapped:259240kB dirty:176kB writeback:0kB shmem:332kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 241664kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1009.627855] copy_process+0x778/0x9be0 [ 1009.631461] Node 0 [ 1009.635094] ? kmsan_set_origin_inline+0x6b/0x120 [ 1009.635177] ? __msan_poison_alloca+0x15c/0x1d0 [ 1009.668403] DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1009.673173] ? cp_new_stat+0x327/0x9b0 [ 1009.673226] ? __msan_poison_alloca+0x141/0x1d0 [ 1009.677890] lowmem_reserve[]: [ 1009.706117] _do_fork+0x353/0xf60 [ 1009.706161] __x64_sys_clone+0x15e/0x1b0 [ 1009.710043] 0 [ 1009.712272] ? __ia32_sys_vfork+0x70/0x70 [ 1009.712308] do_syscall_64+0x15b/0x230 [ 1009.717143] 2817 [ 1009.721814] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1009.721851] RIP: 0033:0x7f0fc369df46 [ 1009.747370] 7244 [ 1009.751222] RSP: 002b:00007fffea036ce0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1009.751264] RAX: ffffffffffffffda RBX: 00007fffea036ce0 RCX: 00007f0fc369df46 [ 1009.755939] 7244 [ 1009.759017] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 1009.759032] RBP: 00007fffea036d20 R08: 0000000000000000 R09: 0000000000000002 [ 1009.759056] R10: 00007f0fc3b949d0 R11: 0000000000000246 R12: 0000000000000000 [ 1009.766546] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1009.797108] syz-executor5: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1009.797860] Node 0 [ 1009.805190] syz-executor5 cpuset= [ 1009.807284] DMA32 free:45688kB min:26224kB low:32780kB high:39336kB active_anon:223608kB inactive_anon:0kB active_file:2576kB inactive_file:4172kB unevictable:0kB writepending:84kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1344kB pagetables:1136kB bounce:0kB free_pcp:100kB local_pcp:0kB free_cma:0kB [ 1009.807301] lowmem_reserve[]: [ 1009.814615] / [ 1009.821914] 0 [ 1009.829218] mems_allowed=0 [ 1009.829246] CPU: 1 PID: 31606 Comm: syz-executor5 Not tainted 4.17.0+ #9 [ 1009.829270] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1009.836643] 0 [ 1009.847888] Call Trace: [ 1009.847941] dump_stack+0x185/0x1d0 [ 1009.847982] warn_alloc+0x430/0x690 [ 1009.850212] 4426 [ 1009.853678] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1009.853741] ? __msan_poison_alloca+0x15c/0x1d0 [ 1009.882010] 4426 [ 1009.885167] copy_process+0x778/0x9be0 [ 1009.888647] ? prepare_exit_to_usermode+0x271/0x3a0 [ 1009.888684] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 1009.891707] Node 0 [ 1009.898657] ? do_signal+0x49f/0x1d20 [ 1009.898703] ? __msan_poison_alloca+0x141/0x1d0 [ 1009.908113] Normal free:29724kB min:41208kB low:51508kB high:61808kB active_anon:285124kB inactive_anon:308kB active_file:3928kB inactive_file:20704kB unevictable:0kB writepending:104kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8000kB pagetables:3068kB bounce:0kB free_pcp:76kB local_pcp:0kB free_cma:0kB [ 1009.909866] _do_fork+0x353/0xf60 [ 1009.909927] __x64_sys_clone+0x15e/0x1b0 [ 1009.912474] lowmem_reserve[]: [ 1009.916134] ? __ia32_sys_vfork+0x70/0x70 [ 1009.916169] do_syscall_64+0x15b/0x230 [ 1009.919792] 0 [ 1009.921847] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1009.921876] RIP: 0033:0x41f8b9 [ 1009.926717] 0 [ 1009.931366] RSP: 002b:0000000000a3fad0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1009.931407] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000041f8b9 [ 1009.933465] 0 [ 1009.937330] RDX: 0000000000a3fadc RSI: 0000000000000000 RDI: 0000000000100011 [ 1009.937347] RBP: 0000000000a3fc80 R08: 0000000000a44a60 R09: 0000000000000015 [ 1009.937373] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000a3fe60 [ 1009.942398] 0 [ 1009.947754] R13: 0000000000a3fe28 R14: 0000000000000000 R15: 0000000000000000 [ 1009.979169] sh: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1009.987666] Node 0 DMA: 0*4kB [ 1009.991405] sh cpuset= [ 1009.995502] 0*8kB 0*16kB [ 1009.998654] / [ 1010.002820] 1*32kB [ 1010.006728] mems_allowed=0 [ 1010.008556] (U) 2*64kB [ 1010.013832] CPU: 1 PID: 31725 Comm: sh Not tainted 4.17.0+ #9 [ 1010.017014] (U) [ 1010.018788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1010.018801] Call Trace: [ 1010.018854] dump_stack+0x185/0x1d0 [ 1010.026544] 1*128kB [ 1010.033830] warn_alloc+0x430/0x690 [ 1010.033899] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1010.035667] (U) [ 1010.042975] ? __msan_poison_alloca+0x15c/0x1d0 [ 1010.043061] copy_process+0x778/0x9be0 [ 1010.050328] 1*256kB [ 1010.057606] ? kmsan_set_origin_inline+0x6b/0x120 [ 1010.057640] ? __msan_poison_alloca+0x15c/0x1d0 [ 1010.059446] (U) [ 1010.066715] ? cp_new_stat+0x327/0x9b0 [ 1010.066763] ? __msan_poison_alloca+0x141/0x1d0 [ 1010.077162] 0*512kB [ 1010.080361] _do_fork+0x353/0xf60 [ 1010.080406] __x64_sys_clone+0x15e/0x1b0 [ 1010.082890] 1*1024kB [ 1010.085651] ? __ia32_sys_vfork+0x70/0x70 [ 1010.085684] do_syscall_64+0x15b/0x230 [ 1010.087386] (U) [ 1010.089618] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1010.089647] RIP: 0033:0x7f815f8edf46 [ 1010.092599] 1*2048kB [ 1010.095153] RSP: 002b:00007fff110a37f0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1010.095194] RAX: ffffffffffffffda RBX: 00007fff110a37f0 RCX: 00007f815f8edf46 [ 1010.101083] (M) [ 1010.103028] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 1010.103044] RBP: 00007fff110a3830 R08: 0000000000000000 R09: 0000000000000010 [ 1010.103070] R10: 00007f815fde49d0 R11: 0000000000000246 R12: 0000000000000000 [ 1010.112434] 3*4096kB [ 1010.114993] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1010.247864] (M) = 15904kB [ 1010.250706] Node 0 DMA32: 445*4kB (M) 1447*8kB (M) 380*16kB (ME) 6*32kB (M) 1*64kB (E) 1*128kB (E) 2*256kB (UE) 2*512kB (UE) 2*1024kB (UE) 2*2048kB (U) 4*4096kB (UM) = 43884kB [ 1010.266842] Node 0 Normal: 1163*4kB (ME) 114*8kB (ME) 26*16kB (UME) 10*32kB (MH) 8*64kB (MH) 1*128kB (U) 18*256kB (UH) 16*512kB (U) 2*1024kB (UH) 0*2048kB 0*4096kB = 21788kB [ 1010.283015] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1010.290336] syz-executor0 invoked oom-killer: gfp_mask=0x14082c2(GFP_KERNEL|__GFP_HIGHMEM|__GFP_NOWARN|__GFP_ZERO), nodemask=(null), order=0, oom_score_adj=0 [ 1010.291660] 5573 total pagecache pages [ 1010.291687] 0 pages in swap cache [ 1010.306051] syz-executor0 cpuset= [ 1010.309979] Swap cache stats: add 0, delete 0, find 0/0 [ 1010.310001] Free swap = 0kB [ 1010.313474] / [ 1010.316969] Total swap = 0kB [ 1010.322508] mems_allowed=0 [ 1010.325538] 1965969 pages RAM [ 1010.325555] 0 pages HighMem/MovableOnly [ 1010.327308] CPU: 1 PID: 31709 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 1010.330418] 106316 pages reserved [ 1010.333340] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1010.333353] Call Trace: [ 1010.333411] dump_stack+0x185/0x1d0 [ 1010.366847] dump_header+0x2cc/0x16f0 [ 1010.370732] ? __msan_poison_alloca+0x15c/0x1d0 [ 1010.375490] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1010.381009] ? ___ratelimit+0x67f/0x760 [ 1010.385154] oom_kill_process+0x341/0x2160 [ 1010.389475] ? oom_evaluate_task+0x84a/0xb60 [ 1010.393974] out_of_memory+0x1700/0x1da0 [ 1010.398128] ? __udp4_lib_lookup+0x1540/0x28e0 [ 1010.402798] __alloc_pages_nodemask+0x4e4f/0x5cc0 [ 1010.407774] alloc_pages_current+0x6b1/0x970 [ 1010.412246] __vmalloc_node_range+0x83c/0x1170 [ 1010.416934] vmalloc_user+0xe1/0x3d0 [ 1010.420721] ? kcov_mmap+0x2a/0x120 [ 1010.424414] ? kcov_ioctl+0x1d0/0x1d0 [ 1010.428356] kcov_mmap+0x2a/0x120 [ 1010.431855] ? kcov_ioctl+0x1d0/0x1d0 [ 1010.435702] mmap_region+0x2751/0x3730 [ 1010.439696] do_mmap+0x1902/0x2010 [ 1010.443328] vm_mmap_pgoff+0x31b/0x430 [ 1010.447302] ksys_mmap_pgoff+0xa5a/0xaf0 [ 1010.451444] __x64_sys_mmap+0x1f1/0x260 [ 1010.455472] ? align_vdso_addr+0x420/0x420 [ 1010.459755] do_syscall_64+0x15b/0x230 [ 1010.463695] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1010.468920] RIP: 0033:0x455aea [ 1010.472136] RSP: 002b:00007ffeb58fcc18 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 1010.479919] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000455aea [ 1010.487231] RDX: 0000000000000003 RSI: 0000000000200000 RDI: 0000000000000000 [ 1010.494636] RBP: 000000000000000f R08: 000000000000000f R09: 0000000000000000 [ 1010.501949] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000000 [ 1010.509276] R13: 0000000000200000 R14: 0000000000000001 R15: 0000000000000000 [ 1010.517808] Mem-Info: [ 1010.520377] active_anon:127223 inactive_anon:77 isolated_anon:0 [ 1010.520377] active_file:1031 inactive_file:1038 isolated_file:40 [ 1010.520377] unevictable:0 dirty:19 writeback:0 unstable:0 [ 1010.520377] slab_reclaimable:3295 slab_unreclaimable:8395 [ 1010.520377] mapped:61095 shmem:83 pagetables:991 bounce:0 [ 1010.520377] free:23600 free_pcp:401 free_cma:0 [ 1010.553679] Node 0 active_anon:508892kB inactive_anon:308kB active_file:3300kB inactive_file:3396kB unevictable:0kB isolated(anon):0kB isolated(file):128kB mapped:242756kB dirty:76kB writeback:0kB shmem:332kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 241664kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1010.582046] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1010.608693] lowmem_reserve[]: 0 2817 7244 7244 [ 1010.613491] Node 0 DMA32 free:43728kB min:26224kB low:32780kB high:39336kB active_anon:223724kB inactive_anon:0kB active_file:840kB inactive_file:1384kB unevictable:0kB writepending:4kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1280kB pagetables:920kB bounce:0kB free_pcp:728kB local_pcp:48kB free_cma:0kB [ 1010.642434] lowmem_reserve[]: 0 0 4426 4426 [ 1010.646917] Node 0 Normal free:39808kB min:41208kB low:51508kB high:61808kB active_anon:285168kB inactive_anon:308kB active_file:1336kB inactive_file:1728kB unevictable:0kB writepending:36kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8064kB pagetables:3044kB bounce:0kB free_pcp:1372kB local_pcp:720kB free_cma:0kB [ 1010.676556] lowmem_reserve[]: 0 0 0 0 [ 1010.680513] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 1010.694000] Node 0 DMA32: 463*4kB (M) 1603*8kB (UM) 382*16kB (UME) 9*32kB (UM) 2*64kB (UE) 2*128kB (UE) 2*256kB (UE) 1*512kB (E) 1*1024kB (E) 2*2048kB (U) 4*4096kB (UM) = 43988kB [ 1010.710383] Node 0 Normal: 1621*4kB (UME) 803*8kB (UME) 237*16kB (UME) 26*32kB (UMH) 24*64kB (UMH) 14*128kB (UM) 18*256kB (UMH) 19*512kB (UM) 4*1024kB (UMH) 0*2048kB 0*4096kB = 39292kB [ 1010.727309] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1010.736072] 1106 total pagecache pages [ 1010.740045] 0 pages in swap cache [ 1010.743597] Swap cache stats: add 0, delete 0, find 0/0 [ 1010.749054] Free swap = 0kB [ 1010.752146] Total swap = 0kB [ 1010.755242] 1965969 pages RAM [ 1010.758421] 0 pages HighMem/MovableOnly [ 1010.762483] 106316 pages reserved [ 1010.766016] [ pid ] uid tgid total_vm rss pgtables_bytes swapents oom_score_adj name [ 1010.774785] [ 2269] 0 2269 5476 433 90112 0 -1000 udevd [ 1010.783058] [ 4239] 0 4239 2493 574 53248 0 0 dhclient [ 1010.791603] [ 4388] 0 4388 30604 147 122880 0 0 rsyslogd [ 1010.800140] [ 4431] 0 4431 4725 47 86016 0 0 cron [ 1010.808448] [ 4457] 0 4457 12490 152 139264 0 -1000 sshd [ 1010.816628] [ 4481] 0 4481 3694 43 77824 0 0 getty [ 1010.824906] [ 4482] 0 4482 3694 43 77824 0 0 getty [ 1010.833198] [ 4483] 0 4483 3694 43 73728 0 0 getty [ 1010.841573] [ 4484] 0 4484 3694 42 69632 0 0 getty [ 1010.849845] [ 4485] 0 4485 3694 44 73728 0 0 getty [ 1010.858123] [ 4486] 0 4486 3694 42 73728 0 0 getty [ 1010.866416] [ 4487] 0 4487 3649 41 77824 0 0 getty [ 1010.874686] [ 4502] 0 4502 17821 213 192512 0 0 sshd [ 1010.882855] [ 4504] 0 4504 250128 124990 1605632 0 0 syz-fuzzer [ 1010.891549] [31527] 0 31527 5475 514 86016 0 -1000 udevd [ 1010.899794] [31530] 0 31530 5475 513 86016 0 -1000 udevd [ 1010.904739] sh: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1010.908049] [31586] 0 31586 17553 55 118784 0 0 syz-executor5 [ 1010.908088] [31589] 0 31589 17553 54 114688 0 0 syz-executor6 [ 1010.918472] sh cpuset= [ 1010.927351] [31606] 0 31606 17553 8109 118784 0 0 syz-executor5 [ 1010.936219] / [ 1010.938746] [31607] 0 31607 17553 8108 114688 0 0 syz-executor6 [ 1010.947575] mems_allowed=0 [ 1010.949338] [31608] 0 31608 17553 58 118784 0 0 syz-executor7 [ 1010.958382] CPU: 0 PID: 31722 Comm: sh Not tainted 4.17.0+ #9 [ 1010.961368] [31610] 0 31610 17553 59 114688 0 0 syz-executor2 [ 1010.970153] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1010.970165] Call Trace: [ 1010.970215] dump_stack+0x185/0x1d0 [ 1010.970256] warn_alloc+0x430/0x690 [ 1010.976183] [31612] 0 31612 17553 58 114688 0 0 syz-executor1 [ 1010.985015] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1010.985075] ? __msan_poison_alloca+0x15c/0x1d0 [ 1010.994467] [31613] 0 31613 17553 8108 118784 0 0 syz-executor7 [ 1010.997041] copy_process+0x778/0x9be0 [ 1010.997090] ? kmsan_set_origin_inline+0x6b/0x120 [ 1011.000747] [31626] 0 31626 17553 8108 114688 0 0 syz-executor1 [ 1011.004327] ? __msan_poison_alloca+0x15c/0x1d0 [ 1011.004354] ? cp_new_stat+0x327/0x9b0 [ 1011.004402] ? __msan_poison_alloca+0x141/0x1d0 [ 1011.013287] [31669] 0 31669 17553 59 118784 0 0 syz-executor3 [ 1011.018099] _do_fork+0x353/0xf60 [ 1011.018145] __x64_sys_clone+0x15e/0x1b0 [ 1011.022847] [31708] 0 31708 17553 8109 118784 0 0 syz-executor3 [ 1011.031648] ? __ia32_sys_vfork+0x70/0x70 [ 1011.031684] do_syscall_64+0x15b/0x230 [ 1011.035607] [31709] 0 31709 15505 80 98304 0 0 syz-executor0 [ 1011.040414] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1011.040445] RIP: 0033:0x7f091c4a3f46 [ 1011.049326] [31711] 0 31711 13457 80 81920 0 0 syz-executor4 [ 1011.053922] RSP: 002b:00007ffd1b00fae0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1011.053955] RAX: ffffffffffffffda RBX: 00007ffd1b00fae0 RCX: 00007f091c4a3f46 [ 1011.053971] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 1011.053995] RBP: 00007ffd1b00fb20 R08: 0000000000000000 R09: 0000000000000010 [ 1011.057925] [31722] 0 31722 1050 115 57344 0 0 sh [ 1011.062531] R10: 00007f091c99a9d0 R11: 0000000000000246 R12: 0000000000000000 [ 1011.062546] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1011.062660] warn_alloc_show_mem: 3 callbacks suppressed [ 1011.062667] Mem-Info: [ 1011.071468] [31726] 0 31726 1050 104 57344 0 0 sh [ 1011.071506] [31727] 0 31727 17401 261 53248 0 0 sh [ 1011.075057] active_anon:127194 inactive_anon:77 isolated_anon:0 [ 1011.075057] active_file:462 inactive_file:275 isolated_file:51 [ 1011.075057] unevictable:0 dirty:19 writeback:0 unstable:0 [ 1011.075057] slab_reclaimable:3295 slab_unreclaimable:8395 [ 1011.075057] mapped:60022 shmem:83 pagetables:991 bounce:0 [ 1011.075057] free:25456 free_pcp:529 free_cma:0 [ 1011.079106] Out of memory: Kill process 4504 (syz-fuzzer) score 69 or sacrifice child [ 1011.088039] Node 0 active_anon:508776kB inactive_anon:308kB active_file:1848kB inactive_file:1100kB unevictable:0kB isolated(anon):0kB isolated(file):204kB mapped:240088kB dirty:76kB writeback:0kB shmem:332kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 241664kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1011.092237] Killed process 31709 (syz-executor0) total-vm:62020kB, anon-rss:60kB, file-rss:260kB, shmem-rss:0kB [ 1011.096117] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1011.306042] lowmem_reserve[]: 0 2817 7244 7244 [ 1011.310764] Node 0 DMA32 free:43688kB min:26224kB low:32780kB high:39336kB active_anon:223724kB inactive_anon:0kB active_file:348kB inactive_file:212kB unevictable:0kB writepending:0kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1280kB pagetables:932kB bounce:0kB free_pcp:1328kB local_pcp:708kB free_cma:0kB [ 1011.339724] lowmem_reserve[]: 0 0 4426 4426 [ 1011.344186] Node 0 Normal free:37296kB min:41208kB low:51508kB high:61808kB active_anon:285168kB inactive_anon:308kB active_file:920kB inactive_file:448kB unevictable:0kB writepending:0kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8064kB pagetables:3044kB bounce:0kB free_pcp:1272kB local_pcp:640kB free_cma:0kB [ 1011.373505] lowmem_reserve[]: 0 0 0 0 [ 1011.377453] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 1011.390949] Node 0 DMA32: 424*4kB (UM) 1714*8kB (UM) 386*16kB (UME) 9*32kB (UM) 1*64kB (E) 2*128kB (UE) 2*256kB (UE) 2*512kB (UE) 2*1024kB (UE) 1*2048kB (U) 4*4096kB (UM) = 44208kB [ 1011.407500] Node 0 Normal: 1938*4kB (UME) 812*8kB (UME) 210*16kB (MEH) 15*32kB (MH) 19*64kB (UMH) 13*128kB (UM) 11*256kB (UMH) 19*512kB (UM) 4*1024kB (UMH) 0*2048kB 0*4096kB = 37608kB [ 1011.424261] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1011.432916] 462 total pagecache pages [ 1011.436793] 0 pages in swap cache [ 1011.440332] Swap cache stats: add 0, delete 0, find 0/0 [ 1011.445776] Free swap = 0kB [ 1011.448859] Total swap = 0kB [ 1011.451943] 1965969 pages RAM [ 1011.455133] 0 pages HighMem/MovableOnly [ 1011.459186] 106316 pages reserved [ 1011.463775] sh: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1011.474232] sh cpuset=/ mems_allowed=0 [ 1011.478405] CPU: 1 PID: 31727 Comm: sh Not tainted 4.17.0+ #9 [ 1011.484329] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1011.493819] Call Trace: [ 1011.496494] dump_stack+0x185/0x1d0 [ 1011.500202] warn_alloc+0x430/0x690 [ 1011.503920] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1011.508913] ? __msan_poison_alloca+0x15c/0x1d0 [ 1011.513652] copy_process+0x778/0x9be0 [ 1011.517666] ? kmsan_set_origin_inline+0x6b/0x120 [ 1011.522552] ? __msan_poison_alloca+0x15c/0x1d0 [ 1011.527239] ? cp_new_stat+0x327/0x9b0 [ 1011.531256] ? __msan_poison_alloca+0x141/0x1d0 [ 1011.535981] _do_fork+0x353/0xf60 [ 1011.539472] __x64_sys_clone+0x15e/0x1b0 [ 1011.543549] ? __ia32_sys_vfork+0x70/0x70 [ 1011.547722] do_syscall_64+0x15b/0x230 [ 1011.551648] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1011.556859] RIP: 0033:0x7f8df63e6f46 [ 1011.560586] RSP: 002b:00007ffc9ea13210 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1011.568320] RAX: ffffffffffffffda RBX: 00007ffc9ea13210 RCX: 00007f8df63e6f46 [ 1011.575611] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 1011.582892] RBP: 00007ffc9ea13250 R08: 0000000000000000 R09: 000000000000001a [ 1011.590276] R10: 00007f8df68dd9d0 R11: 0000000000000246 R12: 0000000000000000 [ 1011.597579] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1012.020704] IPVS: ftp: loaded support on port[0] = 21 [ 1012.625157] bridge0: port 1(bridge_slave_0) entered blocking state [ 1012.631728] bridge0: port 1(bridge_slave_0) entered disabled state [ 1012.681564] device bridge_slave_0 entered promiscuous mode [ 1012.757552] bridge0: port 1(bridge_slave_0) entered blocking state [ 1012.764078] bridge0: port 1(bridge_slave_0) entered disabled state [ 1012.808099] device bridge_slave_0 entered promiscuous mode [ 1012.873386] bridge0: port 2(bridge_slave_1) entered blocking state [ 1012.880080] bridge0: port 2(bridge_slave_1) entered disabled state [ 1012.916128] device bridge_slave_1 entered promiscuous mode [ 1012.967282] bridge0: port 1(bridge_slave_0) entered blocking state [ 1012.973833] bridge0: port 1(bridge_slave_0) entered disabled state [ 1012.992079] device bridge_slave_0 entered promiscuous mode [ 1013.005553] bridge0: port 2(bridge_slave_1) entered blocking state [ 1013.012076] bridge0: port 2(bridge_slave_1) entered disabled state [ 1013.023159] device bridge_slave_1 entered promiscuous mode [ 1013.097270] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1013.183941] bridge0: port 2(bridge_slave_1) entered blocking state [ 1013.190642] bridge0: port 2(bridge_slave_1) entered disabled state [ 1013.204841] device bridge_slave_1 entered promiscuous mode [ 1013.232549] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1013.243768] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1013.334651] device bridge_slave_1 left promiscuous mode [ 1013.340631] bridge0: port 2(bridge_slave_1) entered disabled state [ 1013.380170] device bridge_slave_0 left promiscuous mode [ 1013.386096] bridge0: port 1(bridge_slave_0) entered disabled state [ 1013.435638] team0 (unregistering): Port device team_slave_1 removed [ 1013.447802] team0 (unregistering): Port device team_slave_0 removed [ 1013.459417] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1013.475816] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1013.509307] bond0 (unregistering): Released all slaves [ 1013.540042] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1013.556176] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1013.749418] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1013.976099] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1014.095560] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1014.185592] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1014.285125] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1014.312283] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1014.412656] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1014.424103] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1014.497287] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1014.504606] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1014.525065] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1014.757413] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1014.765290] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1014.970440] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1014.994620] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1015.169832] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1015.179457] IPVS: ftp: loaded support on port[0] = 21 [ 1015.207034] team0: Port device team_slave_0 added [ 1015.365850] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1015.385770] team0: Port device team_slave_1 added [ 1015.429832] bridge0: port 1(bridge_slave_0) entered blocking state [ 1015.436382] bridge0: port 1(bridge_slave_0) entered disabled state [ 1015.452873] device bridge_slave_0 entered promiscuous mode [ 1015.528661] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1015.538507] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1015.584628] bridge0: port 2(bridge_slave_1) entered blocking state [ 1015.591230] bridge0: port 2(bridge_slave_1) entered disabled state [ 1015.628216] device bridge_slave_1 entered promiscuous mode [ 1015.677030] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1015.697504] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1015.786175] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1015.811873] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1015.819638] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1015.836217] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1015.875734] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1015.912683] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1015.920507] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1015.933463] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1016.034628] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1016.070440] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1016.078088] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1016.099308] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1016.136487] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1016.166180] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1016.173770] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1016.192472] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1016.366144] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1016.373777] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1016.392359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1016.561354] syz-executor7: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1016.572840] syz-executor7 cpuset=/ mems_allowed=0 [ 1016.578115] CPU: 1 PID: 31613 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 1016.585081] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1016.594478] Call Trace: [ 1016.597131] dump_stack+0x185/0x1d0 [ 1016.600817] warn_alloc+0x430/0x690 [ 1016.604073] syz-executor0: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1016.604498] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1016.615789] syz-executor0 cpuset= [ 1016.620804] ? __msan_poison_alloca+0x15c/0x1d0 [ 1016.620884] copy_process+0x778/0x9be0 [ 1016.624381] / [ 1016.629076] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 1016.632968] mems_allowed=0 [ 1016.634644] ? ptep_set_access_flags+0x10e/0x1d0 [ 1016.634681] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1016.653378] ? __msan_poison_alloca+0x141/0x1d0 [ 1016.658101] _do_fork+0x353/0xf60 [ 1016.661612] __x64_sys_clone+0x15e/0x1b0 [ 1016.665958] ? __ia32_sys_vfork+0x70/0x70 [ 1016.670129] do_syscall_64+0x15b/0x230 [ 1016.674049] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1016.679262] RIP: 0033:0x41f8b9 [ 1016.682459] RSP: 002b:0000000000a3fad0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1016.690200] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000041f8b9 [ 1016.697485] RDX: 0000000000a3fadc RSI: 0000000000000000 RDI: 0000000000100011 [ 1016.704764] RBP: 0000000000a3fc80 R08: 0000000000a44a60 R09: 000000000000002a [ 1016.712047] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000a3fe78 [ 1016.719326] R13: 0000000000a3fe28 R14: 0000000000000000 R15: 0000000000000000 [ 1016.726635] CPU: 0 PID: 31853 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 1016.726776] warn_alloc_show_mem: 1 callbacks suppressed [ 1016.726783] Mem-Info: [ 1016.733504] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1016.733517] Call Trace: [ 1016.733568] dump_stack+0x185/0x1d0 [ 1016.733612] warn_alloc+0x430/0x690 [ 1016.739106] active_anon:127137 inactive_anon:77 isolated_anon:0 [ 1016.739106] active_file:1529 inactive_file:6128 isolated_file:8 [ 1016.739106] unevictable:0 dirty:48 writeback:0 unstable:0 [ 1016.739106] slab_reclaimable:3281 slab_unreclaimable:8021 [ 1016.739106] mapped:64304 shmem:83 pagetables:1002 bounce:0 [ 1016.739106] free:21703 free_pcp:190 free_cma:0 [ 1016.741431] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1016.741502] ? __msan_poison_alloca+0x15c/0x1d0 [ 1016.750915] Node 0 active_anon:508548kB inactive_anon:308kB active_file:6116kB inactive_file:24512kB unevictable:0kB isolated(anon):0kB isolated(file):32kB mapped:257216kB dirty:192kB writeback:0kB shmem:332kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 241664kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1016.753460] copy_process+0x778/0x9be0 [ 1016.753503] ? prepare_exit_to_usermode+0x271/0x3a0 [ 1016.757162] Node 0 [ 1016.760768] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 1016.760810] ? do_signal+0x49f/0x1d20 [ 1016.760850] ? __msan_poison_alloca+0x141/0x1d0 [ 1016.760895] _do_fork+0x353/0xf60 [ 1016.760952] __x64_sys_clone+0x15e/0x1b0 [ 1016.760982] ? __ia32_sys_vfork+0x70/0x70 [ 1016.761002] do_syscall_64+0x15b/0x230 [ 1016.761038] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1016.761057] RIP: 0033:0x41f8b9 [ 1016.761135] RSP: 002b:0000000000a3fc00 EFLAGS: 00000246 [ 1016.794313] DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1016.799050] ORIG_RAX: 0000000000000038 [ 1016.799069] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000041f8b9 [ 1016.799085] RDX: 0000000000a3fc0c RSI: 0000000000000000 RDI: 0000000000100011 [ 1016.799110] RBP: 0000000000a3fdb0 R08: 0000000000a44a60 R09: 000000000000001a [ 1016.803783] lowmem_reserve[]: [ 1016.831875] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000411910 [ 1016.831889] R13: 00000000004119a0 R14: 0000000000000000 R15: 0000000000000000 [ 1016.956898] 0 2817 7244 7244 [ 1016.960160] Node 0 DMA32 free:43808kB min:26224kB low:32780kB high:39336kB active_anon:223660kB inactive_anon:0kB active_file:1560kB inactive_file:220kB unevictable:0kB writepending:120kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1152kB pagetables:1144kB bounce:0kB free_pcp:796kB local_pcp:120kB free_cma:0kB [ 1016.989665] lowmem_reserve[]: 0 0 4426 4426 [ 1016.994124] Node 0 Normal free:27040kB min:41208kB low:51508kB high:61808kB active_anon:284852kB inactive_anon:308kB active_file:4360kB inactive_file:15240kB unevictable:0kB writepending:88kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8000kB pagetables:2940kB bounce:0kB free_pcp:816kB local_pcp:116kB free_cma:0kB [ 1017.023718] lowmem_reserve[]: 0 0 0 0 [ 1017.027655] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 1017.041132] Node 0 DMA32: 314*4kB (UM) 1615*8kB (M) 392*16kB (UME) 9*32kB (M) 4*64kB (UME) 1*128kB (E) 1*256kB (E) 2*512kB (UE) 3*1024kB (UE) 1*2048kB (U) 4*4096kB (UM) = 43904kB [ 1017.057569] Node 0 Normal: 1457*4kB (UME) 695*8kB (ME) 30*16kB (UMEH) 10*32kB (UM) 4*64kB (MH) 4*128kB (UMH) 36*256kB (UH) 17*512kB (UM) 1*1024kB (H) 0*2048kB 0*4096kB = 31900kB [ 1017.073909] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1017.082606] 3754 total pagecache pages [ 1017.086601] 0 pages in swap cache [ 1017.090145] Swap cache stats: add 0, delete 0, find 0/0 [ 1017.095597] Free swap = 0kB [ 1017.098771] Total swap = 0kB [ 1017.101878] 1965969 pages RAM [ 1017.105087] 0 pages HighMem/MovableOnly [ 1017.109158] 106316 pages reserved [ 1017.112965] syz-executor6: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1017.124439] syz-executor6 cpuset=/ mems_allowed=0 [ 1017.129437] CPU: 0 PID: 31607 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 1017.136336] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1017.145734] Call Trace: [ 1017.148406] dump_stack+0x185/0x1d0 [ 1017.152146] warn_alloc+0x430/0x690 [ 1017.155879] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1017.160824] ? __msan_poison_alloca+0x15c/0x1d0 [ 1017.165603] copy_process+0x778/0x9be0 [ 1017.169571] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 1017.174998] ? filemap_map_pages+0x1a5a/0x1ac0 [ 1017.179771] ? kmsan_set_origin_inline+0x6b/0x120 [ 1017.184706] ? __msan_poison_alloca+0x141/0x1d0 [ 1017.189472] _do_fork+0x353/0xf60 [ 1017.193106] __x64_sys_clone+0x15e/0x1b0 [ 1017.197231] ? __ia32_sys_vfork+0x70/0x70 [ 1017.201425] do_syscall_64+0x15b/0x230 [ 1017.205377] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1017.210781] RIP: 0033:0x41f8b9 [ 1017.214086] RSP: 002b:0000000000a3fad0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1017.221935] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000041f8b9 [ 1017.229336] RDX: 0000000000a3fadc RSI: 0000000000000000 RDI: 0000000000100011 [ 1017.236656] RBP: 0000000000a3fc80 R08: 0000000000a44a60 R09: 0000000000000025 [ 1017.243975] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000a3fe68 [ 1017.251295] R13: 0000000000a3fe28 R14: 0000000000000000 R15: 0000000000000000 [ 1017.429122] syz-executor3 invoked oom-killer: gfp_mask=0x14082c2(GFP_KERNEL|__GFP_HIGHMEM|__GFP_NOWARN|__GFP_ZERO), nodemask=(null), order=0, oom_score_adj=0 [ 1017.443534] syz-executor3 cpuset=/ mems_allowed=0 [ 1017.448560] CPU: 0 PID: 31897 Comm: syz-executor3 Not tainted 4.17.0+ #9 [ 1017.455418] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1017.464780] Call Trace: [ 1017.467503] dump_stack+0x185/0x1d0 [ 1017.471151] dump_header+0x2cc/0x16f0 [ 1017.474985] ? __msan_poison_alloca+0x15c/0x1d0 [ 1017.479683] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1017.485160] ? ___ratelimit+0x67f/0x760 [ 1017.489158] oom_kill_process+0x341/0x2160 [ 1017.493455] ? oom_evaluate_task+0x84a/0xb60 [ 1017.497912] out_of_memory+0x1700/0x1da0 [ 1017.502032] ? __udp4_lib_lookup+0x1540/0x28e0 [ 1017.506634] __alloc_pages_nodemask+0x4e4f/0x5cc0 [ 1017.511571] alloc_pages_current+0x6b1/0x970 [ 1017.516005] __vmalloc_node_range+0x83c/0x1170 [ 1017.520637] vmalloc_user+0xe1/0x3d0 [ 1017.524377] ? kcov_mmap+0x2a/0x120 [ 1017.528026] ? kcov_ioctl+0x1d0/0x1d0 [ 1017.531849] kcov_mmap+0x2a/0x120 [ 1017.535316] ? kcov_ioctl+0x1d0/0x1d0 [ 1017.539224] mmap_region+0x2751/0x3730 [ 1017.543167] do_mmap+0x1902/0x2010 [ 1017.546739] vm_mmap_pgoff+0x31b/0x430 [ 1017.550668] ksys_mmap_pgoff+0xa5a/0xaf0 [ 1017.554775] __x64_sys_mmap+0x1f1/0x260 [ 1017.559306] ? align_vdso_addr+0x420/0x420 [ 1017.563580] do_syscall_64+0x15b/0x230 [ 1017.567532] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1017.572732] RIP: 0033:0x455aea [ 1017.575923] RSP: 002b:00007ffff23e4af8 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 1017.583656] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000455aea [ 1017.590934] RDX: 0000000000000003 RSI: 0000000000200000 RDI: 0000000000000000 [ 1017.598317] RBP: 000000000000000f R08: 000000000000000f R09: 0000000000000000 [ 1017.605592] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000000 [ 1017.612882] R13: 0000000000200000 R14: 0000000000000001 R15: 0000000000000000 [ 1017.620383] Mem-Info: [ 1017.622938] active_anon:127146 inactive_anon:77 isolated_anon:0 [ 1017.622938] active_file:245 inactive_file:254 isolated_file:32 [ 1017.622938] unevictable:0 dirty:55 writeback:0 unstable:0 [ 1017.622938] slab_reclaimable:3281 slab_unreclaimable:7935 [ 1017.622938] mapped:59373 shmem:83 pagetables:968 bounce:0 [ 1017.622938] free:24368 free_pcp:29 free_cma:0 [ 1017.656276] Node 0 active_anon:508584kB inactive_anon:308kB active_file:980kB inactive_file:1016kB unevictable:0kB isolated(anon):0kB isolated(file):128kB mapped:237492kB dirty:220kB writeback:0kB shmem:332kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 241664kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1017.684674] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1017.711193] lowmem_reserve[]: 0 2817 7244 7244 [ 1017.715911] Node 0 DMA32 free:43532kB min:26224kB low:32780kB high:39336kB active_anon:223624kB inactive_anon:0kB active_file:836kB inactive_file:256kB unevictable:0kB writepending:132kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1152kB pagetables:904kB bounce:0kB free_pcp:220kB local_pcp:0kB free_cma:0kB [ 1017.744837] lowmem_reserve[]: 0 0 4426 4426 [ 1017.749278] Node 0 Normal free:38540kB min:41208kB low:51508kB high:61808kB active_anon:284960kB inactive_anon:308kB active_file:1088kB inactive_file:700kB unevictable:0kB writepending:88kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8000kB pagetables:2968kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1017.778343] lowmem_reserve[]: 0 0 0 0 [ 1017.782250] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 1017.796047] Node 0 DMA32: 407*4kB (M) 1865*8kB (M) 394*16kB (ME) 11*32kB (UM) 3*64kB (ME) 2*128kB (UE) 2*256kB (UE) 1*512kB (E) 1*1024kB (E) 1*2048kB (U) 4*4096kB (UM) = 44132kB [ 1017.812331] Node 0 Normal: 2271*4kB (UME) 847*8kB (UME) 238*16kB (UMEH) 30*32kB (UMH) 28*64kB (UMH) 19*128kB (UM) 10*256kB (UMH) 19*512kB (UM) 2*1024kB (MH) 0*2048kB 0*4096kB = 39188kB [ 1017.829244] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1017.837914] 241 total pagecache pages [ 1017.841816] 0 pages in swap cache [ 1017.845352] Swap cache stats: add 0, delete 0, find 0/0 [ 1017.851073] Free swap = 0kB [ 1017.854168] Total swap = 0kB [ 1017.857445] 1965969 pages RAM [ 1017.860622] 0 pages HighMem/MovableOnly [ 1017.864656] 106316 pages reserved [ 1017.868166] [ pid ] uid tgid total_vm rss pgtables_bytes swapents oom_score_adj name [ 1017.876892] [ 2269] 0 2269 5476 268 90112 0 -1000 udevd [ 1017.885143] [ 4239] 0 4239 2493 574 53248 0 0 dhclient [ 1017.893663] [ 4388] 0 4388 30604 154 122880 0 0 rsyslogd [ 1017.902177] [ 4431] 0 4431 4725 47 86016 0 0 cron [ 1017.910347] [ 4457] 0 4457 12490 152 139264 0 -1000 sshd [ 1017.918695] [ 4481] 0 4481 3694 41 77824 0 0 getty [ 1017.927320] [ 4482] 0 4482 3694 41 77824 0 0 getty [ 1017.935855] [ 4483] 0 4483 3694 41 73728 0 0 getty [ 1017.945745] [ 4484] 0 4484 3694 40 69632 0 0 getty [ 1017.954211] [ 4485] 0 4485 3694 42 73728 0 0 getty [ 1017.962436] [ 4486] 0 4486 3694 40 73728 0 0 getty [ 1017.970655] [ 4487] 0 4487 3649 39 77824 0 0 getty [ 1017.979072] [ 4502] 0 4502 17821 213 192512 0 0 sshd [ 1017.987210] [ 4504] 0 4504 250128 124993 1605632 0 0 syz-fuzzer [ 1017.995842] [31527] 0 31527 5475 270 86016 0 -1000 udevd [ 1018.004065] [31530] 0 31530 5475 270 86016 0 -1000 udevd [ 1018.012276] [31586] 0 31586 17553 15 118784 0 0 syz-executor5 [ 1018.021168] [31589] 0 31589 17553 14 114688 0 0 syz-executor6 [ 1018.030075] [31606] 0 31606 17553 8185 118784 0 0 syz-executor5 [ 1018.039222] [31607] 0 31607 17553 8188 114688 0 0 syz-executor6 [ 1018.048134] [31608] 0 31608 17553 14 118784 0 0 syz-executor7 [ 1018.056329] syz-executor6: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1018.057068] [31613] 0 31613 17553 8184 118784 0 0 syz-executor7 [ 1018.057108] [31711] 0 31711 17553 15 114688 0 0 syz-executor4 [ 1018.068535] syz-executor6 cpuset= [ 1018.077409] [31732] 0 31732 17553 8062 114688 0 0 syz-executor4 [ 1018.086252] / [ 1018.089746] [31829] 0 31829 17553 14 114688 0 0 syz-executor0 [ 1018.098608] mems_allowed=0 [ 1018.100328] [31853] 0 31853 17553 8056 114688 0 0 syz-executor0 [ 1018.100368] [31897] 0 31897 15505 16 102400 0 0 syz-executor3 [ 1018.109239] CPU: 1 PID: 31607 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 1018.112202] [31900] 0 31900 14993 15 94208 0 0 syz-executor1 [ 1018.120984] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1018.121000] Call Trace: [ 1018.121062] dump_stack+0x185/0x1d0 [ 1018.129917] [31902] 0 31902 16017 15 98304 0 0 syz-executor2 [ 1018.136713] warn_alloc+0x430/0x690 [ 1018.136766] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1018.145614] [31916] 0 31916 1050 17 53248 0 0 sh [ 1018.154979] ? __msan_poison_alloca+0x15c/0x1d0 [ 1018.155065] copy_process+0x778/0x9be0 [ 1018.157626] [31921] 0 31921 1050 23 53248 0 0 sh [ 1018.161277] ? __msan_poison_alloca+0x141/0x1d0 [ 1018.170114] Out of memory: Kill process 4504 (syz-fuzzer) score 67 or sacrifice child [ 1018.173732] _do_fork+0x353/0xf60 [ 1018.173793] __x64_sys_clone+0x15e/0x1b0 [ 1018.178701] Killed process 31586 (syz-executor5) total-vm:70212kB, anon-rss:60kB, file-rss:0kB, shmem-rss:0kB [ 1018.186486] ? __ia32_sys_vfork+0x70/0x70 [ 1018.186509] do_syscall_64+0x15b/0x230 [ 1018.186554] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1018.246407] RIP: 0033:0x41f8b9 [ 1018.249592] RSP: 002b:0000000000a3fad0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1018.257389] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000041f8b9 [ 1018.264667] RDX: 0000000000a3fadc RSI: 0000000000000000 RDI: 0000000000100011 [ 1018.272291] RBP: 0000000000a3fc80 R08: 0000000000a44a60 R09: 0000000000000022 [ 1018.279564] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000a3fe68 [ 1018.286836] R13: 0000000000a3fe28 R14: 0000000000000000 R15: 0000000000000000 [ 1018.294462] warn_alloc_show_mem: 2 callbacks suppressed [ 1018.294470] Mem-Info: [ 1018.302506] active_anon:127146 inactive_anon:77 isolated_anon:0 [ 1018.302506] active_file:6 inactive_file:19 isolated_file:19 [ 1018.302506] unevictable:0 dirty:23 writeback:0 unstable:0 [ 1018.302506] slab_reclaimable:3281 slab_unreclaimable:7935 [ 1018.302506] mapped:59419 shmem:83 pagetables:970 bounce:0 [ 1018.302506] free:24671 free_pcp:81 free_cma:0 [ 1018.335867] Node 0 active_anon:508584kB inactive_anon:308kB active_file:24kB inactive_file:76kB unevictable:0kB isolated(anon):0kB isolated(file):76kB mapped:237676kB dirty:92kB writeback:0kB shmem:332kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 241664kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1018.363567] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1018.389845] lowmem_reserve[]: 0 2817 7244 7244 [ 1018.394512] Node 0 DMA32 free:43560kB min:26224kB low:32780kB high:39336kB active_anon:223624kB inactive_anon:0kB active_file:108kB inactive_file:192kB unevictable:0kB writepending:0kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1152kB pagetables:912kB bounce:0kB free_pcp:120kB local_pcp:0kB free_cma:0kB [ 1018.423136] lowmem_reserve[]: 0 0 4426 4426 [ 1018.426687] sh invoked oom-killer: gfp_mask=0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null), order=1, oom_score_adj=0 [ 1018.427553] Node 0 Normal free:38008kB min:41208kB low:51508kB high:61808kB active_anon:284960kB inactive_anon:308kB active_file:188kB inactive_file:16kB unevictable:0kB writepending:32kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8000kB pagetables:2968kB bounce:0kB free_pcp:116kB local_pcp:0kB free_cma:0kB [ 1018.439329] sh cpuset= [ 1018.468238] lowmem_reserve[]: 0 [ 1018.470780] / [ 1018.470800] 0 [ 1018.474146] mems_allowed=0 [ 1018.475845] 0 [ 1018.477685] CPU: 0 PID: 31921 Comm: sh Not tainted 4.17.0+ #9 [ 1018.480612] 0 [ 1018.482379] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1018.482392] Call Trace: [ 1018.482449] dump_stack+0x185/0x1d0 [ 1018.490105] dump_header+0x2cc/0x16f0 [ 1018.490151] ? __msan_poison_alloca+0x15c/0x1d0 [ 1018.499534] Node 0 [ 1018.502115] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1018.502150] ? ___ratelimit+0x67f/0x760 [ 1018.505879] DMA: [ 1018.509667] oom_kill_process+0x341/0x2160 [ 1018.509704] ? oom_evaluate_task+0x84a/0xb60 [ 1018.514399] 0*4kB [ 1018.516626] out_of_memory+0x1700/0x1da0 [ 1018.516678] ? __udp4_lib_lookup+0x1540/0x28e0 [ 1018.522124] 0*8kB [ 1018.526085] __alloc_pages_nodemask+0x4e4f/0x5cc0 [ 1018.526164] alloc_pages_current+0x6b1/0x970 [ 1018.528198] 0*16kB [ 1018.532434] __get_free_pages+0x2d/0xc0 [ 1018.532476] pgd_alloc+0x5b/0x610 [ 1018.536888] 1*32kB [ 1018.539030] ? kmsan_set_origin+0x9e/0x160 [ 1018.539087] mm_init+0x65c/0xaf0 [ 1018.543138] (U) [ 1018.547698] mm_alloc+0x122/0x180 [ 1018.547743] do_execveat_common+0x1154/0x2db0 [ 1018.549883] 2*64kB [ 1018.554725] ? getname_flags+0x5da/0xaa0 [ 1018.554786] __x64_sys_execve+0x127/0x180 [ 1018.559173] (U) [ 1018.561395] ? set_binfmt+0x1b0/0x1b0 [ 1018.561430] do_syscall_64+0x15b/0x230 [ 1018.565415] 1*128kB [ 1018.568866] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1018.568896] RIP: 0033:0x7fe4fdd68207 [ 1018.571138] (U) [ 1018.575349] RSP: 002b:00007fff9e5c7508 EFLAGS: 00000202 ORIG_RAX: 000000000000003b [ 1018.575379] RAX: ffffffffffffffda RBX: 00000000009cd2a0 RCX: 00007fe4fdd68207 [ 1018.575406] RDX: 00000000009cd408 RSI: 00000000009cd2a0 RDI: 00000000009cd420 [ 1018.578784] 1*256kB [ 1018.580730] RBP: 00000000009cd420 R08: 00000000009cd198 R09: 00007fe4fdddfa00 [ 1018.580748] R10: 0000000000000000 R11: 0000000000000202 R12: 00000000009cd408 [ 1018.580761] R13: 00000000009cd408 R14: 0000000000000000 R15: 0000000000000000 [ 1018.581381] Mem-Info: [ 1018.584273] (U) [ 1018.588856] active_anon:127146 inactive_anon:77 isolated_anon:0 [ 1018.588856] active_file:6 inactive_file:19 isolated_file:19 [ 1018.588856] unevictable:0 dirty:23 writeback:0 unstable:0 [ 1018.588856] slab_reclaimable:3281 slab_unreclaimable:7935 [ 1018.588856] mapped:59419 shmem:83 pagetables:970 bounce:0 [ 1018.588856] free:24368 free_pcp:59 free_cma:0 [ 1018.591082] 0*512kB [ 1018.595239] Node 0 active_anon:508584kB inactive_anon:308kB active_file:24kB inactive_file:76kB unevictable:0kB isolated(anon):0kB isolated(file):76kB mapped:237676kB dirty:92kB writeback:0kB shmem:332kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 241664kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1018.595258] Node 0 [ 1018.599429] 1*1024kB [ 1018.601454] DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1018.601469] lowmem_reserve[]: [ 1018.605296] (U) [ 1018.609194] 0 2817 [ 1018.611558] 1*2048kB [ 1018.616766] 7244 7244 [ 1018.620530] (M) [ 1018.622531] Node 0 [ 1018.630265] 3*4096kB [ 1018.637592] DMA32 free:43560kB min:26224kB low:32780kB high:39336kB active_anon:223624kB inactive_anon:0kB active_file:108kB inactive_file:192kB unevictable:0kB writepending:0kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1152kB pagetables:912kB bounce:0kB free_pcp:120kB local_pcp:120kB free_cma:0kB [ 1018.637609] lowmem_reserve[]: [ 1018.644906] (M) [ 1018.647235] 0 0 [ 1018.654549] = 15904kB [ 1018.661838] 4426 4426 [ 1018.669166] Node 0 [ 1018.671589] Node 0 Normal free:38008kB min:41208kB low:51508kB high:61808kB active_anon:284960kB inactive_anon:308kB active_file:188kB inactive_file:16kB unevictable:0kB writepending:32kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8000kB pagetables:2968kB bounce:0kB free_pcp:116kB local_pcp:116kB free_cma:0kB [ 1018.673657] DMA32: [ 1018.706329] lowmem_reserve[]: [ 1018.708681] 372*4kB [ 1018.736347] 0 [ 1018.738627] (UM) [ 1018.741060] 0 0 [ 1018.766635] 1900*8kB (UM) [ 1018.769784] 0 [ 1018.771802] 399*16kB [ 1018.774062] Node 0 [ 1018.776512] (UME) [ 1018.779048] DMA: [ 1018.781057] 10*32kB [ 1018.783338] 0*4kB [ 1018.785781] (M) [ 1018.813956] 0*8kB [ 1018.817087] 3*64kB [ 1018.819067] 0*16kB 1*32kB [ 1018.821082] (ME) [ 1018.823499] (U) 2*64kB [ 1018.826065] 1*128kB [ 1018.828309] (U) 1*128kB [ 1018.857533] (E) [ 1018.859776] (U) 1*256kB [ 1018.862917] 1*256kB [ 1018.865243] (U) 0*512kB [ 1018.867077] (E) [ 1018.869146] 1*1024kB (U) [ 1018.871156] 1*512kB [ 1018.874007] 1*2048kB (M) [ 1018.875845] (E) [ 1018.878261] 3*4096kB (M) [ 1018.880540] 1*1024kB [ 1018.882691] = 15904kB [ 1018.882707] Node 0 [ 1018.884785] (E) [ 1018.887113] DMA32: 372*4kB [ 1018.889310] 1*2048kB [ 1018.891289] (UM) 1900*8kB [ 1018.893473] (U) [ 1018.895717] (UM) 399*16kB [ 1018.898607] 4*4096kB [ 1018.900691] (UME) 10*32kB [ 1018.903337] (UM) [ 1018.905661] (M) 3*64kB [ 1018.908379] = 43936kB [ 1018.910364] (ME) 1*128kB [ 1018.913074] Node 0 [ 1018.915400] (E) 1*256kB [ 1018.918111] Normal: [ 1018.920091] (E) 1*512kB [ 1018.922888] 2335*4kB [ 1018.925218] (E) 1*1024kB [ 1018.928032] (UME) [ 1018.930010] (E) 1*2048kB (U) [ 1018.932815] 850*8kB [ 1018.935228] 4*4096kB (UM) [ 1018.937678] (UME) [ 1018.939924] = 43936kB [ 1018.939944] Node 0 [ 1018.941943] 236*16kB [ 1018.944889] Normal: 2335*4kB [ 1018.947336] (UMEH) [ 1018.950183] (UME) 850*8kB [ 1018.952199] 32*32kB [ 1018.955065] (UME) 236*16kB [ 1018.957516] (UMH) [ 1018.960394] (UMEH) 32*32kB (UMH) [ 1018.962516] 28*64kB [ 1018.965108] 28*64kB (UMH) [ 1018.967553] (UMH) [ 1018.970318] 18*128kB (M) [ 1018.972595] 18*128kB [ 1018.975276] 7*256kB (UMH) [ 1018.977633] (M) [ 1018.980319] 18*512kB (UM) [ 1018.982770] 7*256kB [ 1018.985537] 2*1024kB (MH) [ 1018.987736] (UMH) [ 1018.990852] 0*2048kB 0*4096kB [ 1018.993218] 18*512kB [ 1018.996070] = 38092kB [ 1018.996100] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1018.998255] (UM) [ 1019.001454] 124 total pagecache pages [ 1019.001473] 0 pages in swap cache [ 1019.003728] 2*1024kB [ 1019.006149] Swap cache stats: add 0, delete 0, find 0/0 [ 1019.006165] Free swap = 0kB [ 1019.009282] (MH) [ 1019.011528] Total swap = 0kB [ 1019.011546] 1965969 pages RAM [ 1019.014428] 0*2048kB [ 1019.016759] 0 pages HighMem/MovableOnly [ 1019.016775] 106316 pages reserved [ 1019.019724] 0*4096kB [ 1019.021898] [ pid ] uid tgid total_vm rss pgtables_bytes swapents oom_score_adj name [ 1019.022013] [ 2269] 0 2269 5476 268 90112 0 -1000 udevd [ 1019.025383] = 38092kB [ 1019.027740] [ 4239] 0 4239 2493 574 53248 0 0 dhclient [ 1019.027778] [ 4388] 0 4388 30604 154 122880 0 0 rsyslogd [ 1019.030641] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1019.032807] [ 4431] 0 4431 4725 47 86016 0 0 cron [ 1019.032845] [ 4457] 0 4457 12490 152 139264 0 -1000 sshd [ 1019.035623] 124 total pagecache pages [ 1019.038080] [ 4481] 0 4481 3694 41 77824 0 0 getty [ 1019.040926] 0 pages in swap cache [ 1019.042924] [ 4482] 0 4482 3694 41 77824 0 0 getty [ 1019.042965] [ 4483] 0 4483 3694 41 73728 0 0 getty [ 1019.045830] Swap cache stats: add 0, delete 0, find 0/0 [ 1019.048178] [ 4484] 0 4484 3694 40 69632 0 0 getty [ 1019.048215] [ 4485] 0 4485 3694 42 73728 0 0 getty [ 1019.051058] Free swap = 0kB [ 1019.053246] [ 4486] 0 4486 3694 40 73728 0 0 getty [ 1019.053284] [ 4487] 0 4487 3649 39 77824 0 0 getty [ 1019.056482] Total swap = 0kB [ 1019.058923] [ 4502] 0 4502 17821 213 192512 0 0 sshd [ 1019.058965] [ 4504] 0 4504 250128 124993 1605632 0 0 syz-fuzzer [ 1019.061384] 1965969 pages RAM [ 1019.070018] [31527] 0 31527 5475 270 86016 0 -1000 udevd [ 1019.072081] 0 pages HighMem/MovableOnly [ 1019.075905] [31530] 0 31530 5475 270 86016 0 -1000 udevd [ 1019.075947] [31589] 0 31589 17553 14 114688 0 0 syz-executor6 [ 1019.079397] 106316 pages reserved [ 1019.081832] [31606] 0 31606 17553 8185 118784 0 0 syz-executor5 [ 1019.081871] [31607] 0 31607 17553 8188 114688 0 0 syz-executor6 [ 1019.191884] syz-executor5: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1019.196295] [31608] 0 31608 17553 14 118784 0 0 syz-executor7 [ 1019.196337] [31613] 0 31613 17553 8183 118784 0 0 syz-executor7 [ 1019.204614] syz-executor5 cpuset= [ 1019.209952] [31711] 0 31711 17553 15 114688 0 0 syz-executor4 [ 1019.218146] / [ 1019.226330] [31732] 0 31732 17553 8061 114688 0 0 syz-executor4 [ 1019.229329] mems_allowed=0 [ 1019.237495] [31829] 0 31829 17553 14 114688 0 0 syz-executor0 [ 1019.237535] [31853] 0 31853 17553 8022 114688 0 0 syz-executor0 [ 1019.245700] CPU: 1 PID: 31606 Comm: syz-executor5 Not tainted 4.17.0+ #9 [ 1019.248728] [31897] 0 31897 15505 16 102400 0 0 syz-executor3 [ 1019.256735] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1019.256748] Call Trace: [ 1019.256805] dump_stack+0x185/0x1d0 [ 1019.265384] [31900] 0 31900 14993 15 94208 0 0 syz-executor1 [ 1019.268462] warn_alloc+0x430/0x690 [ 1019.268520] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1019.276668] [31902] 0 31902 16017 14 98304 0 0 syz-executor2 [ 1019.280891] ? __msan_poison_alloca+0x15c/0x1d0 [ 1019.280973] copy_process+0x778/0x9be0 [ 1019.289099] [31916] 0 31916 1050 17 53248 0 0 sh [ 1019.297920] ? prepare_exit_to_usermode+0x271/0x3a0 [ 1019.297962] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 1019.301444] [31921] 0 31921 1050 23 53248 0 0 sh [ 1019.310251] ? do_signal+0x49f/0x1d20 [ 1019.310298] ? __msan_poison_alloca+0x141/0x1d0 [ 1019.319137] Out of memory: Kill process 4504 (syz-fuzzer) score 67 or sacrifice child [ 1019.330440] _do_fork+0x353/0xf60 [ 1019.330498] __x64_sys_clone+0x15e/0x1b0 [ 1019.339440] Killed process 31608 (syz-executor7) total-vm:70212kB, anon-rss:56kB, file-rss:0kB, shmem-rss:0kB [ 1019.348177] ? __ia32_sys_vfork+0x70/0x70 [ 1019.348216] do_syscall_64+0x15b/0x230 [ 1019.391479] syz-executor7: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1019.391841] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1019.399385] syz-executor7 cpuset= [ 1019.408270] RIP: 0033:0x41f8b9 [ 1019.408283] RSP: 002b:0000000000a3fad0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1019.417670] / [ 1019.420245] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000041f8b9 [ 1019.423872] mems_allowed=0 [ 1019.432681] RDX: 0000000000a3fadc RSI: 0000000000000000 RDI: 0000000000100011 [ 1019.432698] RBP: 0000000000a3fc80 R08: 0000000000a44a60 R09: 000000000000002c [ 1019.432723] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000a3fe68 [ 1019.591871] R13: 0000000000a3fe28 R14: 0000000000000000 R15: 0000000000000000 [ 1019.599365] CPU: 0 PID: 31613 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 1019.599901] Mem-Info: [ 1019.606246] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1019.606259] Call Trace: [ 1019.606309] dump_stack+0x185/0x1d0 [ 1019.606352] warn_alloc+0x430/0x690 [ 1019.608839] active_anon:127144 inactive_anon:77 isolated_anon:0 [ 1019.608839] active_file:10 inactive_file:19 isolated_file:0 [ 1019.608839] unevictable:0 dirty:0 writeback:0 unstable:0 [ 1019.608839] slab_reclaimable:3281 slab_unreclaimable:7929 [ 1019.608839] mapped:59415 shmem:83 pagetables:948 bounce:0 [ 1019.608839] free:24483 free_pcp:121 free_cma:0 [ 1019.618135] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1019.618199] ? __msan_poison_alloca+0x15c/0x1d0 [ 1019.620812] Node 0 active_anon:508576kB inactive_anon:308kB active_file:40kB inactive_file:76kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:237660kB dirty:0kB writeback:0kB shmem:332kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 241664kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1019.624412] copy_process+0x778/0x9be0 [ 1019.624458] ? kmsan_set_origin_inline+0x6b/0x120 [ 1019.628105] Node 0 [ 1019.660665] ? finish_task_switch+0x103/0x270 [ 1019.660710] ? __msan_poison_alloca+0x141/0x1d0 [ 1019.665627] DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1019.670240] _do_fork+0x353/0xf60 [ 1019.670303] __x64_sys_clone+0x15e/0x1b0 [ 1019.697721] lowmem_reserve[]: [ 1019.701595] ? __ia32_sys_vfork+0x70/0x70 [ 1019.701632] do_syscall_64+0x15b/0x230 [ 1019.706727] 0 [ 1019.708972] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1019.708992] RIP: 0033:0x41f8b9 [ 1019.709015] RSP: 002b:0000000000a3fad0 EFLAGS: 00000246 [ 1019.713623] 2817 [ 1019.718248] ORIG_RAX: 0000000000000038 [ 1019.718267] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000041f8b9 [ 1019.718282] RDX: 0000000000a3fadc RSI: 0000000000000000 RDI: 0000000000100011 [ 1019.718314] RBP: 0000000000a3fc80 R08: 0000000000a44a60 R09: 0000000000000027 [ 1019.744288] 7244 [ 1019.747951] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000a3fe78 [ 1019.747967] R13: 0000000000a3fe28 R14: 0000000000000000 R15: 0000000000000000 [ 1019.825253] 7244 [ 1019.827394] Node 0 DMA32 free:43736kB min:26224kB low:32780kB high:39336kB active_anon:223608kB inactive_anon:0kB active_file:16kB inactive_file:128kB unevictable:0kB writepending:0kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1088kB pagetables:744kB bounce:0kB free_pcp:376kB local_pcp:372kB free_cma:0kB [ 1019.856194] lowmem_reserve[]: 0 0 4426 4426 [ 1019.860658] Node 0 Normal free:38232kB min:41208kB low:51508kB high:61808kB active_anon:284944kB inactive_anon:308kB active_file:28kB inactive_file:36kB unevictable:0kB writepending:0kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7936kB pagetables:2956kB bounce:0kB free_pcp:108kB local_pcp:100kB free_cma:0kB [ 1019.890159] lowmem_reserve[]: 0 0 0 0 [ 1019.894104] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 1019.907596] Node 0 DMA32: 322*4kB (UM) 1900*8kB (M) 399*16kB (UME) 12*32kB (UM) 4*64kB (UME) 2*128kB (UE) 2*256kB (UE) 2*512kB (UE) 2*1024kB (UE) 0*2048kB 4*4096kB (UM) = 43736kB [ 1019.924002] Node 0 Normal: 2335*4kB (UME) 848*8kB (UME) 234*16kB (UMEH) 32*32kB (UMH) 27*64kB (UMH) 17*128kB (M) 8*256kB (UMH) 18*512kB (UM) 2*1024kB (MH) 0*2048kB 0*4096kB = 38108kB [ 1019.940749] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1019.949431] 124 total pagecache pages [ 1019.953311] 0 pages in swap cache [ 1019.956931] Swap cache stats: add 0, delete 0, find 0/0 [ 1019.962406] Free swap = 0kB [ 1019.965590] Total swap = 0kB [ 1019.968694] 1965969 pages RAM [ 1019.971864] 0 pages HighMem/MovableOnly [ 1019.975928] 106316 pages reserved [ 1020.603823] syz-executor0 invoked oom-killer: gfp_mask=0x14200ca(GFP_HIGHUSER_MOVABLE), nodemask=(null), order=0, oom_score_adj=0 [ 1020.615845] syz-executor0 cpuset=/ mems_allowed=0 [ 1020.620840] CPU: 0 PID: 31853 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 1020.627719] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1020.637124] Call Trace: [ 1020.639795] dump_stack+0x185/0x1d0 [ 1020.643510] dump_header+0x2cc/0x16f0 [ 1020.647368] ? __msan_poison_alloca+0x15c/0x1d0 [ 1020.652127] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1020.657639] ? ___ratelimit+0x67f/0x760 [ 1020.661682] oom_kill_process+0x341/0x2160 [ 1020.666008] ? oom_evaluate_task+0x84a/0xb60 [ 1020.670516] out_of_memory+0x1700/0x1da0 [ 1020.674672] ? __udp4_lib_lookup+0x1540/0x28e0 [ 1020.679331] __alloc_pages_nodemask+0x4e4f/0x5cc0 [ 1020.684397] alloc_pages_current+0x6b1/0x970 [ 1020.688882] __page_cache_alloc+0x95/0x320 [ 1020.693211] filemap_fault+0x15eb/0x2590 [ 1020.697368] ext4_filemap_fault+0xbb/0x130 [ 1020.701671] ? ext4_page_mkwrite+0x2a20/0x2a20 [ 1020.706340] handle_mm_fault+0x61a1/0x7ed0 [ 1020.710688] ? filemap_fault+0x2590/0x2590 [ 1020.715015] __do_page_fault+0xec6/0x1a10 [ 1020.719232] do_page_fault+0xb7/0x250 [ 1020.723094] ? page_fault+0x8/0x30 [ 1020.726766] page_fault+0x1e/0x30 [ 1020.730245] RIP: 0033:0x43e260 [ 1020.733454] RSP: 002b:0000000000a3d068 EFLAGS: 00010246 [ 1020.738884] RAX: 0000000000a3fcc0 RBX: 0000000000a3d5f0 RCX: 00000000fbad8004 [ 1020.746276] RDX: 0000000000a3fca0 RSI: 0000000000000025 RDI: 00000000004ba74c [ 1020.753593] RBP: 0000000000a3d5c0 R08: 0000000000a44bd0 R09: 00000000004ba74c [ 1020.760925] R10: 0000000001943940 R11: 0000000000000246 R12: 00000000004ba74c [ 1020.768235] R13: 0000000000a3fca0 R14: 0000000000000000 R15: 0000000000000000 [ 1020.776201] Mem-Info: [ 1020.778771] active_anon:127109 inactive_anon:77 isolated_anon:0 [ 1020.778771] active_file:12 inactive_file:7 isolated_file:6 [ 1020.778771] unevictable:0 dirty:0 writeback:0 unstable:0 [ 1020.778771] slab_reclaimable:3276 slab_unreclaimable:7929 [ 1020.778771] mapped:47127 shmem:83 pagetables:902 bounce:0 [ 1020.778771] free:24611 free_pcp:278 free_cma:0 [ 1020.811447] Node 0 active_anon:508436kB inactive_anon:308kB active_file:48kB inactive_file:28kB unevictable:0kB isolated(anon):0kB isolated(file):24kB mapped:172152kB dirty:0kB writeback:0kB shmem:332kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 241664kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 1020.839215] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1020.865421] lowmem_reserve[]: 0 2817 7244 7244 [ 1020.870452] Node 0 DMA32 free:43884kB min:26224kB low:32780kB high:39336kB active_anon:223612kB inactive_anon:0kB active_file:44kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1088kB pagetables:744kB bounce:0kB free_pcp:444kB local_pcp:4kB free_cma:0kB [ 1020.899032] lowmem_reserve[]: 0 0 4426 4426 [ 1020.903440] Node 0 Normal free:39004kB min:41208kB low:51508kB high:61808kB active_anon:284940kB inactive_anon:308kB active_file:120kB inactive_file:0kB unevictable:0kB writepending:0kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7872kB pagetables:2692kB bounce:0kB free_pcp:680kB local_pcp:48kB free_cma:0kB [ 1020.932568] lowmem_reserve[]: 0 0 0 0 [ 1020.936462] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 1020.949987] Node 0 DMA32: 351*4kB (UM) 1902*8kB (UM) 398*16kB (ME) 11*32kB (UM) 3*64kB (ME) 1*128kB (E) 1*256kB (E) 1*512kB (E) 1*1024kB (E) 1*2048kB (U) 4*4096kB (UM) = 43884kB [ 1020.966153] Node 0 Normal: 2427*4kB (UME) 875*8kB (UME) 235*16kB (UMEH) 32*32kB (UMH) 33*64kB (UMH) 17*128kB (M) 8*256kB (UMH) 18*512kB (UM) 2*1024kB (MH) 0*2048kB 0*4096kB = 39092kB [ 1020.982741] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1020.991376] 108 total pagecache pages [ 1020.995218] 0 pages in swap cache [ 1020.998700] Swap cache stats: add 0, delete 0, find 0/0 [ 1021.004078] Free swap = 0kB [ 1021.007108] Total swap = 0kB [ 1021.010143] 1965969 pages RAM [ 1021.013258] 0 pages HighMem/MovableOnly [ 1021.017274] 106316 pages reserved [ 1021.020786] [ pid ] uid tgid total_vm rss pgtables_bytes swapents oom_score_adj name [ 1021.029551] [ 2269] 0 2269 5476 268 90112 0 -1000 udevd [ 1021.037839] [ 4239] 0 4239 2493 574 53248 0 0 dhclient [ 1021.046373] [ 4388] 0 4388 30604 154 122880 0 0 rsyslogd [ 1021.054877] [ 4431] 0 4431 4725 47 86016 0 0 cron [ 1021.063016] [ 4457] 0 4457 12490 152 139264 0 -1000 sshd [ 1021.071121] [ 4481] 0 4481 3694 41 77824 0 0 getty [ 1021.079305] [ 4482] 0 4482 3694 41 77824 0 0 getty [ 1021.087493] [ 4483] 0 4483 3694 41 73728 0 0 getty [ 1021.095706] [ 4484] 0 4484 3694 40 69632 0 0 getty [ 1021.103955] [ 4485] 0 4485 3694 42 73728 0 0 getty [ 1021.112207] [ 4486] 0 4486 3694 40 73728 0 0 getty [ 1021.120415] [ 4487] 0 4487 3649 39 77824 0 0 getty [ 1021.128611] [ 4502] 0 4502 17821 213 192512 0 0 sshd [ 1021.136748] [ 4504] 0 4504 250128 124993 1605632 0 0 syz-fuzzer [ 1021.145427] [31527] 0 31527 5475 270 86016 0 -1000 udevd [ 1021.153673] [31530] 0 31530 5475 270 86016 0 -1000 udevd [ 1021.161890] [31589] 0 31589 17553 14 114688 0 0 syz-executor6 [ 1021.170785] [31607] 0 31607 17553 8187 114688 0 0 syz-executor6 [ 1021.179683] [31711] 0 31711 17553 15 114688 0 0 syz-executor4 [ 1021.188572] [31732] 0 31732 17553 8061 114688 0 0 syz-executor4 [ 1021.197463] [31829] 0 31829 17553 14 114688 0 0 syz-executor0 [ 1021.206357] [31853] 0 31853 17553 8022 114688 0 0 syz-executor0 [ 1021.215260] [31897] 0 31897 15505 16 102400 0 0 syz-executor3 [ 1021.224193] [31900] 0 31900 14993 15 94208 0 0 syz-executor1 [ 1021.233111] [31902] 0 31902 16017 14 98304 0 0 syz-executor2 [ 1021.242050] [31916] 0 31916 1050 17 53248 0 0 sh [ 1021.250034] [31921] 0 31921 1050 23 53248 0 0 sh [ 1021.258014] Out of memory: Kill process 4504 (syz-fuzzer) score 67 or sacrifice child [ 1021.266138] Killed process 31711 (syz-executor4) total-vm:70212kB, anon-rss:60kB, file-rss:0kB, shmem-rss:0kB [ 1021.311380] oom_reaper: reaped process 31711 (syz-executor4), now anon-rss:0kB, file-rss:0kB, shmem-rss:0kB [ 1021.525434] device bridge_slave_1 left promiscuous mode [ 1021.531641] bridge0: port 2(bridge_slave_1) entered disabled state [ 1021.568303] device bridge_slave_0 left promiscuous mode [ 1021.574518] bridge0: port 1(bridge_slave_0) entered disabled state [ 1021.598563] IPVS: ftp: loaded support on port[0] = 21 [ 1021.600387] IPVS: ftp: loaded support on port[0] = 21 [ 1021.680097] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1021.700487] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1021.709943] IPVS: ftp: loaded support on port[0] = 21 [ 1021.732617] bond0 (unregistering): Released all slaves [ 1023.390311] bridge0: port 1(bridge_slave_0) entered blocking state [ 1023.396824] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1023.436100] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1023.442751] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1024.167639] device bridge_slave_1 left promiscuous mode [ 1024.173626] bridge0: port 2(bridge_slave_1) entered disabled state [ 1024.221149] device bridge_slave_0 left promiscuous mode [ 1024.227040] bridge0: port 1(bridge_slave_0) entered disabled state [ 1024.268734] device bridge_slave_1 left promiscuous mode [ 1024.274589] bridge0: port 2(bridge_slave_1) entered disabled state [ 1024.298098] device bridge_slave_0 left promiscuous mode [ 1024.303876] bridge0: port 1(bridge_slave_0) entered disabled state [ 1024.389735] bond0 (unregistering): Released all slaves [ 1024.417728] team0 (unregistering): Port device team_slave_1 removed [ 1024.427953] team0 (unregistering): Port device team_slave_0 removed [ 1024.437662] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1024.453773] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1024.475150] bond0 (unregistering): Released all slaves [ 1024.871705] bridge0: port 1(bridge_slave_0) entered blocking state [ 1024.878340] bridge0: port 1(bridge_slave_0) entered disabled state [ 1024.908129] device bridge_slave_0 entered promiscuous mode [ 1024.933903] bridge0: port 1(bridge_slave_0) entered blocking state [ 1024.940512] bridge0: port 1(bridge_slave_0) entered disabled state [ 1024.980777] device bridge_slave_0 entered promiscuous mode [ 1024.992402] IPVS: ftp: loaded support on port[0] = 21 [ 1025.038700] bridge0: port 1(bridge_slave_0) entered blocking state [ 1025.045224] bridge0: port 1(bridge_slave_0) entered disabled state [ 1025.070175] device bridge_slave_0 entered promiscuous mode [ 1025.090382] bridge0: port 2(bridge_slave_1) entered blocking state [ 1025.096870] bridge0: port 2(bridge_slave_1) entered disabled state [ 1025.107077] device bridge_slave_1 entered promiscuous mode [ 1025.120329] bridge0: port 2(bridge_slave_1) entered blocking state [ 1025.126895] bridge0: port 2(bridge_slave_1) entered disabled state [ 1025.169134] device bridge_slave_1 entered promiscuous mode [ 1025.245503] bridge0: port 2(bridge_slave_1) entered blocking state [ 1025.252141] bridge0: port 2(bridge_slave_1) entered disabled state [ 1025.296131] device bridge_slave_1 entered promiscuous mode [ 1025.331445] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1025.342038] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1025.513737] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1025.531590] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1025.550171] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1025.798075] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1025.971210] syz-executor4: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1025.982644] syz-executor4 cpuset=/ mems_allowed=0 [ 1025.987752] CPU: 1 PID: 32068 Comm: syz-executor4 Not tainted 4.17.0+ #9 [ 1025.994640] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1026.004222] Call Trace: [ 1026.006876] dump_stack+0x185/0x1d0 [ 1026.010558] warn_alloc+0x430/0x690 [ 1026.014274] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1026.019222] ? __msan_poison_alloca+0x15c/0x1d0 [ 1026.024001] copy_process+0x778/0x9be0 [ 1026.027946] ? prepare_exit_to_usermode+0x271/0x3a0 [ 1026.028539] syz-executor1: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1026.033308] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 1026.033353] ? do_signal+0x49f/0x1d20 [ 1026.033395] ? __msan_poison_alloca+0x141/0x1d0 [ 1026.044715] syz-executor1 cpuset= [ 1026.050080] _do_fork+0x353/0xf60 [ 1026.050152] __x64_sys_clone+0x15e/0x1b0 [ 1026.053986] / [ 1026.058601] ? __ia32_sys_vfork+0x70/0x70 [ 1026.062052] mems_allowed=0 [ 1026.065469] do_syscall_64+0x15b/0x230 [ 1026.065525] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1026.087398] RIP: 0033:0x41f8b9 [ 1026.090588] RSP: 002b:0000000000a3fc00 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1026.098309] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000041f8b9 [ 1026.105606] RDX: 0000000000a3fc0c RSI: 0000000000000000 RDI: 0000000000100011 [ 1026.112879] RBP: 0000000000a3fdb0 R08: 0000000000a44a60 R09: 000000000000004d [ 1026.120160] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000411910 [ 1026.127431] R13: 00000000004119a0 R14: 0000000000000000 R15: 0000000000000000 [ 1026.134738] CPU: 0 PID: 31925 Comm: syz-executor1 Not tainted 4.17.0+ #9 [ 1026.135093] warn_alloc_show_mem: 1 callbacks suppressed [ 1026.135099] Mem-Info: [ 1026.141598] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1026.141612] Call Trace: [ 1026.141663] dump_stack+0x185/0x1d0 [ 1026.147093] active_anon:127187 inactive_anon:77 isolated_anon:0 [ 1026.147093] active_file:1524 inactive_file:6223 isolated_file:32 [ 1026.147093] unevictable:0 dirty:79 writeback:0 unstable:0 [ 1026.147093] slab_reclaimable:3278 slab_unreclaimable:7777 [ 1026.147093] mapped:63819 shmem:83 pagetables:997 bounce:0 [ 1026.147093] free:20816 free_pcp:135 free_cma:0 [ 1026.149416] warn_alloc+0x430/0x690 [ 1026.149469] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1026.158856] Node 0 active_anon:508748kB inactive_anon:308kB active_file:6096kB inactive_file:24892kB unevictable:0kB isolated(anon):0kB isolated(file):128kB mapped:255276kB dirty:316kB writeback:0kB shmem:332kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 241664kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1026.161397] ? __msan_poison_alloca+0x15c/0x1d0 [ 1026.161479] copy_process+0x778/0x9be0 [ 1026.165215] Node 0 [ 1026.198548] ? prepare_exit_to_usermode+0x271/0x3a0 [ 1026.198587] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 1026.202264] DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1026.207032] ? do_signal+0x49f/0x1d20 [ 1026.207078] ? __msan_poison_alloca+0x141/0x1d0 [ 1026.235284] lowmem_reserve[]: [ 1026.239973] _do_fork+0x353/0xf60 [ 1026.240033] __x64_sys_clone+0x15e/0x1b0 [ 1026.243979] 0 [ 1026.246208] ? __ia32_sys_vfork+0x70/0x70 [ 1026.246242] do_syscall_64+0x15b/0x230 [ 1026.251246] 2817 [ 1026.256612] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1026.256646] RIP: 0033:0x41f8b9 [ 1026.282301] 7244 [ 1026.286050] RSP: 002b:0000000000a3fad0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1026.286076] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000041f8b9 [ 1026.286102] RDX: 0000000000a3fadc RSI: 0000000000000000 RDI: 0000000000100011 [ 1026.290793] 7244 [ 1026.293871] RBP: 0000000000a3fc80 R08: 0000000000a44a60 R09: 000000000000003f [ 1026.293887] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000a3fe60 [ 1026.293911] R13: 0000000000a3fe28 R14: 0000000000000000 R15: 0000000000000000 [ 1026.367348] syz-executor6: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1026.370440] Node 0 DMA32 free:43496kB min:26224kB low:32780kB high:39336kB active_anon:224316kB inactive_anon:0kB active_file:28kB inactive_file:716kB unevictable:0kB writepending:56kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1088kB pagetables:1020kB bounce:0kB free_pcp:316kB local_pcp:88kB free_cma:0kB [ 1026.381810] syz-executor6 cpuset=/ [ 1026.410577] lowmem_reserve[]: [ 1026.410654] mems_allowed=0 [ 1026.414163] 0 0 4426 [ 1026.417339] CPU: 0 PID: 31607 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 1026.420267] 4426 [ 1026.422646] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1026.422658] Call Trace: [ 1026.422710] dump_stack+0x185/0x1d0 [ 1026.431683] warn_alloc+0x430/0x690 [ 1026.431736] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1026.441079] Node 0 [ 1026.443693] ? __msan_poison_alloca+0x15c/0x1d0 [ 1026.443774] copy_process+0x778/0x9be0 [ 1026.447410] Normal free:22624kB min:41208kB low:51508kB high:61808kB active_anon:284796kB inactive_anon:308kB active_file:5840kB inactive_file:24336kB unevictable:0kB writepending:260kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8000kB pagetables:2968kB bounce:0kB free_pcp:556kB local_pcp:124kB free_cma:0kB [ 1026.450967] ? prepare_exit_to_usermode+0x271/0x3a0 [ 1026.451003] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 1026.455838] lowmem_reserve[]: [ 1026.458066] ? do_signal+0x49f/0x1d20 [ 1026.458110] ? __msan_poison_alloca+0x141/0x1d0 [ 1026.462779] 0 [ 1026.466689] _do_fork+0x353/0xf60 [ 1026.466750] __x64_sys_clone+0x15e/0x1b0 [ 1026.495637] 0 [ 1026.500644] ? __ia32_sys_vfork+0x70/0x70 [ 1026.500681] do_syscall_64+0x15b/0x230 [ 1026.506040] 0 [ 1026.509158] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1026.509188] RIP: 0033:0x41f8b9 [ 1026.512988] 0 [ 1026.517624] RSP: 002b:0000000000a3fad0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1026.517651] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000041f8b9 [ 1026.517665] RDX: 0000000000a3fadc RSI: 0000000000000000 RDI: 0000000000100011 [ 1026.517680] RBP: 0000000000a3fc80 R08: 0000000000a44a60 R09: 0000000000000027 [ 1026.517705] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000a3fe98 [ 1026.522945] R13: 0000000000a3fe28 R14: 0000000000000000 R15: 0000000000000000 [ 1026.593549] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 1026.607102] Node 0 DMA32: 90*4kB (UM) 2674*8kB (UME) 646*16kB (UM) 64*32kB (M) 5*64kB (UME) 1*128kB (E) 2*256kB (UE) 2*512kB (UE) 1*1024kB (E) 1*2048kB (U) 1*4096kB (M) = 43288kB [ 1026.623492] Node 0 Normal: 322*4kB (UME) 118*8kB (UME) 18*16kB (UMEH) 12*32kB (UMEH) 1*64kB (M) 3*128kB (UH) 19*256kB (UM) 23*512kB (UMH) 3*1024kB (UMH) 0*2048kB 0*4096kB = 23064kB [ 1026.640173] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1026.648819] 7725 total pagecache pages [ 1026.652790] 0 pages in swap cache [ 1026.656313] Swap cache stats: add 0, delete 0, find 0/0 [ 1026.661734] Free swap = 0kB [ 1026.664830] Total swap = 0kB [ 1026.667907] 1965969 pages RAM [ 1026.671062] 0 pages HighMem/MovableOnly [ 1026.675088] 106316 pages reserved [ 1026.679413] sh: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1026.689818] sh cpuset=/ mems_allowed=0 [ 1026.693877] CPU: 1 PID: 32111 Comm: sh Not tainted 4.17.0+ #9 [ 1026.699797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1026.709194] Call Trace: [ 1026.711852] dump_stack+0x185/0x1d0 [ 1026.715542] warn_alloc+0x430/0x690 [ 1026.719273] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1026.724212] ? __msan_poison_alloca+0x15c/0x1d0 [ 1026.729054] copy_process+0x778/0x9be0 [ 1026.733036] ? kmsan_set_origin_inline+0x6b/0x120 [ 1026.737954] ? __msan_poison_alloca+0x15c/0x1d0 [ 1026.742692] ? cp_new_stat+0x327/0x9b0 [ 1026.746650] ? __msan_poison_alloca+0x141/0x1d0 [ 1026.751397] _do_fork+0x353/0xf60 [ 1026.754922] __x64_sys_clone+0x15e/0x1b0 [ 1026.759051] ? __ia32_sys_vfork+0x70/0x70 [ 1026.763242] do_syscall_64+0x15b/0x230 [ 1026.767183] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1026.772408] RIP: 0033:0x7fbf0f164f46 [ 1026.776152] RSP: 002b:00007fffcbffa680 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1026.783907] RAX: ffffffffffffffda RBX: 00007fffcbffa680 RCX: 00007fbf0f164f46 [ 1026.791216] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 1026.798546] RBP: 00007fffcbffa6c0 R08: 0000000000000000 R09: 000000000000002c [ 1026.805861] R10: 00007fbf0f65b9d0 R11: 0000000000000246 R12: 0000000000000000 [ 1026.813175] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1026.885236] syz-executor3: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1026.896668] syz-executor3 cpuset=/ mems_allowed=0 [ 1026.901686] CPU: 1 PID: 31923 Comm: syz-executor3 Not tainted 4.17.0+ #9 [ 1026.908563] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1026.917959] Call Trace: [ 1026.920620] dump_stack+0x185/0x1d0 [ 1026.924299] warn_alloc+0x430/0x690 [ 1026.928004] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1026.932931] ? __msan_poison_alloca+0x15c/0x1d0 [ 1026.937703] copy_process+0x778/0x9be0 [ 1026.941632] ? prepare_exit_to_usermode+0x271/0x3a0 [ 1026.946708] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 1026.952140] ? do_signal+0x49f/0x1d20 [ 1026.956014] ? __msan_poison_alloca+0x141/0x1d0 [ 1026.960766] _do_fork+0x353/0xf60 [ 1026.964305] __x64_sys_clone+0x15e/0x1b0 [ 1026.968419] ? __ia32_sys_vfork+0x70/0x70 [ 1026.972613] do_syscall_64+0x15b/0x230 [ 1026.976563] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1026.981817] RIP: 0033:0x41f8b9 [ 1026.985028] RSP: 002b:0000000000a3fad0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1026.992782] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000041f8b9 [ 1027.000118] RDX: 0000000000a3fadc RSI: 0000000000000000 RDI: 0000000000100011 [ 1027.007430] RBP: 0000000000a3fc80 R08: 0000000000a44a60 R09: 0000000000000025 [ 1027.014741] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000a3fe60 [ 1027.022053] R13: 0000000000a3fe28 R14: 0000000000000000 R15: 0000000000000000 [ 1027.057544] syz-executor2: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1027.069021] syz-executor2 cpuset=/ mems_allowed=0 [ 1027.074064] CPU: 1 PID: 31924 Comm: syz-executor2 Not tainted 4.17.0+ #9 [ 1027.080940] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1027.090344] Call Trace: [ 1027.093052] dump_stack+0x185/0x1d0 [ 1027.096731] warn_alloc+0x430/0x690 [ 1027.100430] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1027.105356] ? __msan_poison_alloca+0x15c/0x1d0 [ 1027.110123] copy_process+0x778/0x9be0 [ 1027.114090] ? prepare_exit_to_usermode+0x271/0x3a0 [ 1027.119164] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 1027.124600] ? do_signal+0x49f/0x1d20 [ 1027.128444] ? __msan_poison_alloca+0x141/0x1d0 [ 1027.133142] _do_fork+0x353/0xf60 [ 1027.136632] __x64_sys_clone+0x15e/0x1b0 [ 1027.140706] ? __ia32_sys_vfork+0x70/0x70 [ 1027.144858] do_syscall_64+0x15b/0x230 [ 1027.148769] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1027.153968] RIP: 0033:0x41f8b9 [ 1027.157182] RSP: 002b:0000000000a3fad0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1027.164913] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000041f8b9 [ 1027.172198] RDX: 0000000000a3fadc RSI: 0000000000000000 RDI: 0000000000100011 [ 1027.179474] RBP: 0000000000a3fc80 R08: 0000000000a44a60 R09: 0000000000000025 [ 1027.186748] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000a3fe60 [ 1027.194026] R13: 0000000000a3fe28 R14: 0000000000000000 R15: 0000000000000000 [ 1027.201441] warn_alloc_show_mem: 4 callbacks suppressed [ 1027.201448] Mem-Info: [ 1027.209388] active_anon:127167 inactive_anon:77 isolated_anon:0 [ 1027.209388] active_file:464 inactive_file:472 isolated_file:49 [ 1027.209388] unevictable:0 dirty:28 writeback:0 unstable:0 [ 1027.209388] slab_reclaimable:3278 slab_unreclaimable:7785 [ 1027.209388] mapped:58327 shmem:83 pagetables:935 bounce:0 [ 1027.209388] free:25105 free_pcp:211 free_cma:0 [ 1027.242486] Node 0 active_anon:508668kB inactive_anon:308kB active_file:1856kB inactive_file:1680kB unevictable:0kB isolated(anon):0kB isolated(file):320kB mapped:232960kB dirty:112kB writeback:0kB shmem:332kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 241664kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1027.270690] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1027.297023] lowmem_reserve[]: 0 2817 7244 7244 [ 1027.301752] Node 0 DMA32 free:43428kB min:26224kB low:32780kB high:39336kB active_anon:223864kB inactive_anon:0kB active_file:36kB inactive_file:48kB unevictable:0kB writepending:84kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1088kB pagetables:764kB bounce:0kB free_pcp:48kB local_pcp:0kB free_cma:0kB [ 1027.330279] lowmem_reserve[]: 0 0 4426 4426 [ 1027.334707] Node 0 Normal free:41088kB min:41208kB low:51508kB high:61808kB active_anon:284804kB inactive_anon:308kB active_file:2048kB inactive_file:2284kB unevictable:0kB writepending:260kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8000kB pagetables:2976kB bounce:0kB free_pcp:832kB local_pcp:100kB free_cma:0kB [ 1027.364291] lowmem_reserve[]: 0 0 0 0 [ 1027.368222] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 1027.381682] Node 0 DMA32: 281*4kB (UM) 2699*8kB (UME) 648*16kB (UM) 66*32kB (UM) 7*64kB (UME) 2*128kB (UE) 2*256kB (UE) 1*512kB (E) 1*1024kB (E) 1*2048kB (U) 1*4096kB (M) = 44092kB [ 1027.391241] syz-executor6: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1027.398243] Node 0 Normal: [ 1027.409577] syz-executor6 cpuset= [ 1027.409586] 1884*4kB (ME) [ 1027.412566] / [ 1027.416025] 1148*8kB [ 1027.418882] mems_allowed=0 [ 1027.420593] (UME) 355*16kB (MEH) 74*32kB (MEH) 42*64kB [ 1027.423189] CPU: 0 PID: 31607 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 1027.426104] (UM) [ 1027.431449] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1027.431461] Call Trace: [ 1027.431516] dump_stack+0x185/0x1d0 [ 1027.438333] 18*128kB [ 1027.440395] warn_alloc+0x430/0x690 [ 1027.440447] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1027.449802] (UMH) [ 1027.452410] ? __msan_poison_alloca+0x15c/0x1d0 [ 1027.452497] copy_process+0x778/0x9be0 [ 1027.456067] 3*256kB [ 1027.458476] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 1027.458520] ? ptep_set_access_flags+0x10e/0x1d0 [ 1027.462125] (UMH) [ 1027.466963] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1027.467010] ? __msan_poison_alloca+0x141/0x1d0 [ 1027.469157] 16*512kB [ 1027.473838] _do_fork+0x353/0xf60 [ 1027.473898] __x64_sys_clone+0x15e/0x1b0 [ 1027.477750] (UMH) [ 1027.480068] ? __ia32_sys_vfork+0x70/0x70 [ 1027.480104] do_syscall_64+0x15b/0x230 [ 1027.485560] 3*1024kB [ 1027.490312] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1027.490340] RIP: 0033:0x41f8b9 [ 1027.492509] (UMH) [ 1027.497937] RSP: 002b:0000000000a3fad0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1027.497965] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000041f8b9 [ 1027.497990] RDX: 0000000000a3fadc RSI: 0000000000000000 RDI: 0000000000100011 [ 1027.502679] 0*2048kB [ 1027.505066] RBP: 0000000000a3fc80 R08: 0000000000a44a60 R09: 0000000000000031 [ 1027.505081] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000a3fe98 [ 1027.505105] R13: 0000000000a3fe28 R14: 0000000000000000 R15: 0000000000000000 [ 1027.508567] 0*4096kB = 41792kB [ 1027.586685] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1027.595331] 566 total pagecache pages [ 1027.599211] 0 pages in swap cache [ 1027.602719] Swap cache stats: add 0, delete 0, find 0/0 [ 1027.608140] Free swap = 0kB [ 1027.611204] Total swap = 0kB [ 1027.614269] 1965969 pages RAM [ 1027.617448] 0 pages HighMem/MovableOnly [ 1027.621489] 106316 pages reserved [ 1027.657138] syz-executor5 invoked oom-killer: gfp_mask=0x14082c2(GFP_KERNEL|__GFP_HIGHMEM|__GFP_NOWARN|__GFP_ZERO), nodemask=(null), order=0, oom_score_adj=0 [ 1027.671497] syz-executor5 cpuset=/ mems_allowed=0 [ 1027.676514] CPU: 1 PID: 32093 Comm: syz-executor5 Not tainted 4.17.0+ #9 [ 1027.683413] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1027.692783] Call Trace: [ 1027.695414] dump_stack+0x185/0x1d0 [ 1027.699484] dump_header+0x2cc/0x16f0 [ 1027.703297] ? __msan_poison_alloca+0x15c/0x1d0 [ 1027.707998] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1027.713455] ? ___ratelimit+0x67f/0x760 [ 1027.717445] oom_kill_process+0x341/0x2160 [ 1027.721693] ? oom_evaluate_task+0x84a/0xb60 [ 1027.726143] out_of_memory+0x1700/0x1da0 [ 1027.730244] ? __udp4_lib_lookup+0x1540/0x28e0 [ 1027.734838] __alloc_pages_nodemask+0x4e4f/0x5cc0 [ 1027.739742] alloc_pages_current+0x6b1/0x970 [ 1027.744164] __vmalloc_node_range+0x83c/0x1170 [ 1027.748777] vmalloc_user+0xe1/0x3d0 [ 1027.752506] ? kcov_mmap+0x2a/0x120 [ 1027.756150] ? kcov_ioctl+0x1d0/0x1d0 [ 1027.759979] kcov_mmap+0x2a/0x120 [ 1027.763446] ? kcov_ioctl+0x1d0/0x1d0 [ 1027.767254] mmap_region+0x2751/0x3730 [ 1027.771198] do_mmap+0x1902/0x2010 [ 1027.774769] vm_mmap_pgoff+0x31b/0x430 [ 1027.779637] ksys_mmap_pgoff+0xa5a/0xaf0 [ 1027.783742] __x64_sys_mmap+0x1f1/0x260 [ 1027.787728] ? align_vdso_addr+0x420/0x420 [ 1027.791975] do_syscall_64+0x15b/0x230 [ 1027.795883] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1027.801089] RIP: 0033:0x455aea [ 1027.804278] RSP: 002b:00007ffc4376e3c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 1027.812014] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000455aea [ 1027.819294] RDX: 0000000000000003 RSI: 0000000000200000 RDI: 0000000000000000 [ 1027.826566] RBP: 0000000000000010 R08: 0000000000000010 R09: 0000000000000000 [ 1027.833860] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000000 [ 1027.841142] R13: 0000000000200000 R14: 0000000000000001 R15: 0000000000000000 [ 1027.848688] Mem-Info: [ 1027.851230] active_anon:127166 inactive_anon:77 isolated_anon:0 [ 1027.851230] active_file:59 inactive_file:46 isolated_file:2 [ 1027.851230] unevictable:0 dirty:30 writeback:0 unstable:0 [ 1027.851230] slab_reclaimable:3276 slab_unreclaimable:7774 [ 1027.851230] mapped:58000 shmem:83 pagetables:936 bounce:0 [ 1027.851230] free:25324 free_pcp:94 free_cma:0 [ 1027.884065] Node 0 active_anon:508664kB inactive_anon:308kB active_file:0kB inactive_file:184kB unevictable:0kB isolated(anon):0kB isolated(file):136kB mapped:231768kB dirty:120kB writeback:0kB shmem:332kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 241664kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1027.911923] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1027.938252] lowmem_reserve[]: 0 2817 7244 7244 [ 1027.943025] Node 0 DMA32 free:43908kB min:26224kB low:32780kB high:39336kB active_anon:223864kB inactive_anon:0kB active_file:0kB inactive_file:36kB unevictable:0kB writepending:16kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1088kB pagetables:764kB bounce:0kB free_pcp:24kB local_pcp:0kB free_cma:0kB [ 1027.971528] lowmem_reserve[]: 0 0 4426 4426 [ 1027.975996] Node 0 Normal free:40860kB min:41208kB low:51508kB high:61808kB active_anon:284800kB inactive_anon:308kB active_file:384kB inactive_file:296kB unevictable:0kB writepending:52kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7936kB pagetables:2980kB bounce:0kB free_pcp:508kB local_pcp:0kB free_cma:0kB [ 1028.005134] lowmem_reserve[]: 0 0 0 0 [ 1028.009050] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 1028.022499] Node 0 DMA32: 296*4kB (UM) 2703*8kB (UME) 649*16kB (UM) 67*32kB (UM) 8*64kB (UME) 2*128kB (UE) 2*256kB (UE) 1*512kB (E) 1*1024kB (E) 1*2048kB (U) 1*4096kB (M) = 44296kB [ 1028.039009] Node 0 Normal: 2459*4kB (UME) 1152*8kB (UME) 342*16kB (UMEH) 65*32kB (MEH) 37*64kB (M) 21*128kB (MH) 5*256kB (MH) 10*512kB (UMH) 3*1024kB (UMH) 0*2048kB 0*4096kB = 41132kB [ 1028.055811] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1028.064654] 127 total pagecache pages [ 1028.068520] 0 pages in swap cache [ 1028.072062] Swap cache stats: add 0, delete 0, find 0/0 [ 1028.077443] Free swap = 0kB [ 1028.080471] Total swap = 0kB [ 1028.083501] 1965969 pages RAM [ 1028.086714] 0 pages HighMem/MovableOnly [ 1028.090710] 106316 pages reserved [ 1028.094173] [ pid ] uid tgid total_vm rss pgtables_bytes swapents oom_score_adj name [ 1028.102816] [ 2269] 0 2269 5476 268 90112 0 -1000 udevd [ 1028.111040] [ 4239] 0 4239 2493 574 53248 0 0 dhclient [ 1028.119479] [ 4388] 0 4388 30604 192 122880 0 0 rsyslogd [ 1028.128007] [ 4431] 0 4431 4725 47 86016 0 0 cron [ 1028.136150] [ 4457] 0 4457 12490 152 139264 0 -1000 sshd [ 1028.144303] [ 4481] 0 4481 3694 41 77824 0 0 getty [ 1028.151627] syz-executor1: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1028.152542] [ 4482] 0 4482 3694 41 77824 0 0 getty [ 1028.163925] syz-executor1 cpuset= [ 1028.172087] [ 4483] 0 4483 3694 41 73728 0 0 getty [ 1028.172125] [ 4484] 0 4484 3694 40 69632 0 0 getty [ 1028.175603] / [ 1028.183759] [ 4485] 0 4485 3694 42 73728 0 0 getty [ 1028.191902] mems_allowed=0 [ 1028.193642] [ 4486] 0 4486 3694 40 73728 0 0 getty [ 1028.193681] [ 4487] 0 4487 3649 39 77824 0 0 getty [ 1028.201895] CPU: 0 PID: 31925 Comm: syz-executor1 Not tainted 4.17.0+ #9 [ 1028.204841] [ 4502] 0 4502 17821 213 192512 0 0 sshd [ 1028.212930] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1028.212943] Call Trace: [ 1028.213007] dump_stack+0x185/0x1d0 [ 1028.221167] [ 4504] 0 4504 250128 125025 1605632 0 0 syz-fuzzer [ 1028.228024] warn_alloc+0x430/0x690 [ 1028.228077] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1028.236153] [31527] 0 31527 5475 270 86016 0 -1000 udevd [ 1028.245666] ? __msan_poison_alloca+0x15c/0x1d0 [ 1028.245747] copy_process+0x778/0x9be0 [ 1028.248305] [31530] 0 31530 5475 270 86016 0 -1000 udevd [ 1028.251902] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 1028.251946] ? ptep_set_access_flags+0x10e/0x1d0 [ 1028.260533] [31589] 0 31589 17553 14 114688 0 0 syz-executor6 [ 1028.264132] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1028.264180] ? __msan_poison_alloca+0x141/0x1d0 [ 1028.269058] [31607] 0 31607 17553 8211 114688 0 0 syz-executor6 [ 1028.277189] _do_fork+0x353/0xf60 [ 1028.277248] __x64_sys_clone+0x15e/0x1b0 [ 1028.281918] [31897] 0 31897 17553 15 118784 0 0 syz-executor3 [ 1028.285790] ? __ia32_sys_vfork+0x70/0x70 [ 1028.285827] do_syscall_64+0x15b/0x230 [ 1028.294177] [31900] 0 31900 17553 14 114688 0 0 syz-executor1 [ 1028.299599] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1028.299628] RIP: 0033:0x41f8b9 [ 1028.304409] [31902] 0 31902 17553 14 110592 0 0 syz-executor2 [ 1028.313189] RSP: 002b:0000000000a3fad0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1028.313218] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000041f8b9 [ 1028.313245] RDX: 0000000000a3fadc RSI: 0000000000000000 RDI: 0000000000100011 [ 1028.318736] [31924] 0 31924 17553 8055 110592 0 0 syz-executor2 [ 1028.323360] RBP: 0000000000a3fc80 R08: 0000000000a44a60 R09: 0000000000000025 [ 1028.323376] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000a3fe60 [ 1028.323402] R13: 0000000000a3fe28 R14: 0000000000000000 R15: 0000000000000000 [ 1028.332271] [31923] 0 31923 17553 8056 118784 0 0 syz-executor3 [ 1028.336243] warn_alloc_show_mem: 1 callbacks suppressed [ 1028.336251] Mem-Info: [ 1028.339797] [31925] 0 31925 17553 8055 114688 0 0 syz-executor1 [ 1028.339838] [32047] 0 32047 17553 14 114688 0 0 syz-executor4 [ 1028.348761] active_anon:127166 inactive_anon:77 isolated_anon:0 [ 1028.348761] active_file:0 inactive_file:6 isolated_file:2 [ 1028.348761] unevictable:0 dirty:30 writeback:0 unstable:0 [ 1028.348761] slab_reclaimable:3276 slab_unreclaimable:7774 [ 1028.348761] mapped:57884 shmem:83 pagetables:936 bounce:0 [ 1028.348761] free:25165 free_pcp:0 free_cma:0 [ 1028.352880] [32068] 0 32068 17553 8054 114688 0 0 syz-executor4 [ 1028.352919] [32093] 0 32093 16017 15 102400 0 0 syz-executor5 [ 1028.356880] Node 0 active_anon:508664kB inactive_anon:308kB active_file:0kB inactive_file:24kB unevictable:0kB isolated(anon):0kB isolated(file):8kB mapped:231536kB dirty:120kB writeback:0kB shmem:332kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 241664kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1028.365700] [32095] 0 32095 13969 16 90112 0 0 syz-executor7 [ 1028.365739] [32097] 0 32097 14993 16 98304 0 0 syz-executor0 [ 1028.370935] Node 0 [ 1028.374159] Out of memory: Kill process 4504 (syz-fuzzer) score 67 or sacrifice child [ 1028.374252] Killed process 31897 (syz-executor3) total-vm:70212kB, anon-rss:60kB, file-rss:0kB, shmem-rss:0kB [ 1028.383091] DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1028.396088] syz-executor2: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1028.398256] lowmem_reserve[]: [ 1028.405420] syz-executor2 cpuset= [ 1028.414388] 0 [ 1028.421585] / [ 1028.428883] 2817 [ 1028.436195] mems_allowed=0 [ 1028.445052] 7244 [ 1028.450500] CPU: 1 PID: 31924 Comm: syz-executor2 Not tainted 4.17.0+ #9 [ 1028.452907] 7244 [ 1028.461713] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1028.461727] Call Trace: [ 1028.461782] dump_stack+0x185/0x1d0 [ 1028.502922] warn_alloc+0x430/0x690 [ 1028.502975] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1028.511819] Node 0 [ 1028.520673] ? __msan_poison_alloca+0x15c/0x1d0 [ 1028.520753] copy_process+0x778/0x9be0 [ 1028.548501] DMA32 free:44048kB min:26224kB low:32780kB high:39336kB active_anon:223772kB inactive_anon:0kB active_file:0kB inactive_file:116kB unevictable:0kB writepending:0kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1024kB pagetables:732kB bounce:0kB free_pcp:120kB local_pcp:0kB free_cma:0kB [ 1028.557269] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 1028.557330] ? ptep_set_access_flags+0x10e/0x1d0 [ 1028.566152] lowmem_reserve[]: [ 1028.568378] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1028.568427] ? __msan_poison_alloca+0x141/0x1d0 [ 1028.576393] 0 [ 1028.586451] _do_fork+0x353/0xf60 [ 1028.586512] __x64_sys_clone+0x15e/0x1b0 [ 1028.612032] 0 [ 1028.623298] ? __ia32_sys_vfork+0x70/0x70 [ 1028.623334] do_syscall_64+0x15b/0x230 [ 1028.626443] 4426 [ 1028.629888] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1028.629917] RIP: 0033:0x41f8b9 [ 1028.631717] 4426 [ 1028.633420] RSP: 002b:0000000000a3fad0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1028.633448] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000041f8b9 [ 1028.633473] RDX: 0000000000a3fadc RSI: 0000000000000000 RDI: 0000000000100011 [ 1028.638437] RBP: 0000000000a3fc80 R08: 0000000000a44a60 R09: 0000000000000025 [ 1028.638455] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000a3fe60 [ 1028.638480] R13: 0000000000a3fe28 R14: 0000000000000000 R15: 0000000000000000 [ 1028.640549] Node 0 [ 1028.808642] oom_reaper: reaped process 31897 (syz-executor3), now anon-rss:0kB, file-rss:0kB, shmem-rss:0kB [ 1028.813947] Normal free:39148kB min:41208kB low:51508kB high:61808kB active_anon:284800kB inactive_anon:308kB active_file:300kB inactive_file:328kB unevictable:0kB writepending:16kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7936kB pagetables:2980kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1028.854348] lowmem_reserve[]: 0 0 0 0 [ 1028.858209] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 1028.859950] syz-executor0 invoked oom-killer: gfp_mask=0x14082c2(GFP_KERNEL|__GFP_HIGHMEM|__GFP_NOWARN|__GFP_ZERO), nodemask=(null), order=0, oom_score_adj=0 [ 1028.871560] Node 0 DMA32: 284*4kB (UM) 2697*8kB (UME) [ 1028.885868] syz-executor0 cpuset=/ [ 1028.891202] 645*16kB [ 1028.891240] mems_allowed=0 [ 1028.894780] (M) [ 1028.897291] CPU: 1 PID: 32097 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 1028.900168] 65*32kB [ 1028.902110] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1028.902123] Call Trace: [ 1028.902177] dump_stack+0x185/0x1d0 [ 1028.908996] (UM) [ 1028.911313] dump_header+0x2cc/0x16f0 [ 1028.911368] ? __msan_poison_alloca+0x15c/0x1d0 [ 1028.920722] 8*64kB [ 1028.923306] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1028.923341] ? ___ratelimit+0x67f/0x760 [ 1028.926965] (UME) [ 1028.929035] oom_kill_process+0x341/0x2160 [ 1028.929085] ? oom_evaluate_task+0x84a/0xb60 [ 1028.932872] 2*128kB [ 1028.937541] out_of_memory+0x1700/0x1da0 [ 1028.937583] ? __udp4_lib_lookup+0x1540/0x28e0 [ 1028.939810] (UE) [ 1028.945263] __alloc_pages_nodemask+0x4e4f/0x5cc0 [ 1028.945343] alloc_pages_current+0x6b1/0x970 [ 1028.949274] 2*256kB [ 1028.951416] __vmalloc_node_range+0x83c/0x1170 [ 1028.951470] vmalloc_user+0xe1/0x3d0 [ 1028.955694] (UE) [ 1028.960112] ? kcov_mmap+0x2a/0x120 [ 1028.960157] ? kcov_ioctl+0x1d0/0x1d0 [ 1028.962472] 2*512kB [ 1028.966526] kcov_mmap+0x2a/0x120 [ 1028.966557] ? kcov_ioctl+0x1d0/0x1d0 [ 1028.971143] (UE) [ 1028.973186] mmap_region+0x2751/0x3730 [ 1028.973240] do_mmap+0x1902/0x2010 [ 1028.978067] 2*1024kB [ 1028.982481] vm_mmap_pgoff+0x31b/0x430 [ 1028.982542] ksys_mmap_pgoff+0xa5a/0xaf0 [ 1028.984843] (UE) [ 1028.989455] __x64_sys_mmap+0x1f1/0x260 [ 1028.989490] ? align_vdso_addr+0x420/0x420 [ 1028.993207] 0*2048kB [ 1028.995249] do_syscall_64+0x15b/0x230 [ 1028.995299] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1028.998911] 1*4096kB [ 1029.002689] RIP: 0033:0x455aea [ 1029.002704] RSP: 002b:00007ffdeda41738 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 1029.005058] (M) [ 1029.008485] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000455aea [ 1029.008501] RDX: 0000000000000003 RSI: 0000000000200000 RDI: 0000000000000000 [ 1029.008515] RBP: 000000000000000e R08: 000000000000000e R09: 0000000000000000 [ 1029.008538] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000000 [ 1029.012344] = 43560kB [ 1029.014375] R13: 0000000000200000 R14: 0000000000000001 R15: 0000000000000000 [ 1029.014546] Mem-Info: [ 1029.018324] Node 0 [ 1029.021947] active_anon:127143 inactive_anon:77 isolated_anon:0 [ 1029.021947] active_file:1 inactive_file:2 isolated_file:2 [ 1029.021947] unevictable:0 dirty:4 writeback:0 unstable:0 [ 1029.021947] slab_reclaimable:3276 slab_unreclaimable:7774 [ 1029.021947] mapped:57877 shmem:83 pagetables:928 bounce:0 [ 1029.021947] free:24599 free_pcp:152 free_cma:0 [ 1029.024329] Normal: [ 1029.028292] Node 0 active_anon:508572kB inactive_anon:308kB active_file:4kB inactive_file:8kB unevictable:0kB isolated(anon):0kB isolated(file):8kB mapped:231508kB dirty:16kB writeback:0kB shmem:332kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 241664kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1029.032327] 2635*4kB [ 1029.034399] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1029.038424] (UME) [ 1029.042667] lowmem_reserve[]: 0 [ 1029.045118] 1146*8kB [ 1029.049027] 2817 [ 1029.054241] (ME) [ 1029.056656] 7244 7244 [ 1029.059906] 339*16kB [ 1029.069644] (UMEH) [ 1029.076969] Node 0 DMA32 free:43344kB min:26224kB low:32780kB high:39336kB active_anon:223772kB inactive_anon:0kB active_file:0kB inactive_file:4kB unevictable:0kB writepending:0kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1024kB pagetables:732kB bounce:0kB free_pcp:408kB local_pcp:408kB free_cma:0kB [ 1029.084292] 63*32kB [ 1029.091591] lowmem_reserve[]: [ 1029.098903] (UMEH) [ 1029.101349] 0 0 [ 1029.108667] 35*64kB [ 1029.111082] 4426 4426 [ 1029.113405] (M) [ 1029.148147] 22*128kB [ 1029.175512] Node 0 [ 1029.177950] (MH) [ 1029.204154] Normal free:39148kB min:41208kB low:51508kB high:61808kB active_anon:284800kB inactive_anon:308kB active_file:300kB inactive_file:328kB unevictable:0kB writepending:16kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7936kB pagetables:2980kB bounce:0kB free_pcp:200kB local_pcp:200kB free_cma:0kB [ 1029.206283] 6*256kB [ 1029.209567] lowmem_reserve[]: 0 [ 1029.212014] (MH) [ 1029.214097] 0 [ 1029.216180] 5*512kB [ 1029.218680] 0 0 [ 1029.221137] (UMH) [ 1029.223401] Node 0 [ 1029.251790] 3*1024kB (UMH) 0*2048kB [ 1029.254153] DMA: 0*4kB [ 1029.257309] 0*4096kB [ 1029.259554] 0*8kB 0*16kB [ 1029.261578] = 39372kB [ 1029.263910] 1*32kB (U) [ 1029.266474] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1029.268446] 2*64kB (U) [ 1029.270892] 127 total pagecache pages [ 1029.273167] 1*128kB [ 1029.275250] 0 pages in swap cache [ 1029.303822] (U) [ 1029.306190] Swap cache stats: add 0, delete 0, find 0/0 [ 1029.309471] 1*256kB (U) [ 1029.311578] Free swap = 0kB [ 1029.313391] 0*512kB 1*1024kB [ 1029.315768] Total swap = 0kB [ 1029.317753] (U) 1*2048kB [ 1029.320054] 1965969 pages RAM [ 1029.322313] (M) 3*4096kB [ 1029.326185] 0 pages HighMem/MovableOnly [ 1029.326204] 106316 pages reserved [ 1029.328805] (M) = 15904kB [ 1029.398673] Node 0 DMA32: 285*4kB (UM) 2698*8kB (UME) 645*16kB (M) 65*32kB (UM) 8*64kB (UME) 2*128kB (UE) 2*256kB (UE) 2*512kB (UE) 2*1024kB (UE) 0*2048kB 1*4096kB (M) = 43572kB [ 1029.415288] Node 0 Normal: 2635*4kB (UME) 1146*8kB (ME) 339*16kB (UMEH) 63*32kB (UMEH) 35*64kB (M) 22*128kB (MH) 6*256kB (MH) 5*512kB (UMH) 3*1024kB (UMH) 0*2048kB 0*4096kB = 39372kB [ 1029.432026] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1029.440677] 121 total pagecache pages [ 1029.444576] 0 pages in swap cache [ 1029.448098] Swap cache stats: add 0, delete 0, find 0/0 [ 1029.453513] Free swap = 0kB [ 1029.456571] Total swap = 0kB [ 1029.459626] 1965969 pages RAM [ 1029.462770] 0 pages HighMem/MovableOnly [ 1029.466785] 106316 pages reserved [ 1029.470281] [ pid ] uid tgid total_vm rss pgtables_bytes swapents oom_score_adj name [ 1029.479033] [ 2269] 0 2269 5476 268 90112 0 -1000 udevd [ 1029.487278] [ 4239] 0 4239 2493 574 53248 0 0 dhclient [ 1029.495783] [ 4388] 0 4388 30604 192 122880 0 0 rsyslogd [ 1029.504291] [ 4431] 0 4431 4725 47 86016 0 0 cron [ 1029.512474] [ 4457] 0 4457 12490 152 139264 0 -1000 sshd [ 1029.520630] [ 4481] 0 4481 3694 41 77824 0 0 getty [ 1029.528872] [ 4482] 0 4482 3694 41 77824 0 0 getty [ 1029.537129] [ 4483] 0 4483 3694 41 73728 0 0 getty [ 1029.545458] [ 4484] 0 4484 3694 40 69632 0 0 getty [ 1029.553689] [ 4485] 0 4485 3694 42 73728 0 0 getty [ 1029.561924] [ 4486] 0 4486 3694 40 73728 0 0 getty [ 1029.570200] [ 4487] 0 4487 3649 39 77824 0 0 getty [ 1029.578437] [ 4502] 0 4502 17821 213 192512 0 0 sshd [ 1029.586596] [ 4504] 0 4504 250128 125025 1605632 0 0 syz-fuzzer [ 1029.595284] [31527] 0 31527 5475 270 86016 0 -1000 udevd [ 1029.603561] [31530] 0 31530 5475 270 86016 0 -1000 udevd [ 1029.611900] [31589] 0 31589 17553 14 114688 0 0 syz-executor6 [ 1029.620850] [31607] 0 31607 17553 8179 114688 0 0 syz-executor6 [ 1029.629788] [31900] 0 31900 17553 14 114688 0 0 syz-executor1 [ 1029.638735] [31902] 0 31902 17553 14 110592 0 0 syz-executor2 [ 1029.647677] [31924] 0 31924 17553 8023 110592 0 0 syz-executor2 [ 1029.656621] [31923] 0 31923 17553 8181 118784 0 0 syz-executor3 [ 1029.665559] [31925] 0 31925 17553 8055 114688 0 0 syz-executor1 [ 1029.674500] [32047] 0 32047 17553 14 114688 0 0 syz-executor4 [ 1029.683459] [32068] 0 32068 17553 8022 114688 0 0 syz-executor4 [ 1029.692426] [32093] 0 32093 16017 15 102400 0 0 syz-executor5 [ 1029.701371] [32095] 0 32095 13969 16 90112 0 0 syz-executor7 [ 1029.710320] [32097] 0 32097 14993 16 98304 0 0 syz-executor0 [ 1029.719242] Out of memory: Kill process 4504 (syz-fuzzer) score 67 or sacrifice child [ 1029.727400] Killed process 32047 (syz-executor4) total-vm:70212kB, anon-rss:56kB, file-rss:0kB, shmem-rss:0kB [ 1030.099302] oom_reaper: reaped process 32047 (syz-executor4), now anon-rss:0kB, file-rss:0kB, shmem-rss:0kB [ 1030.152059] device bridge_slave_1 left promiscuous mode [ 1030.158150] bridge0: port 2(bridge_slave_1) entered disabled state [ 1030.202089] device bridge_slave_0 left promiscuous mode [ 1030.207937] bridge0: port 1(bridge_slave_0) entered disabled state [ 1030.238182] IPVS: ftp: loaded support on port[0] = 21 [ 1030.262421] bond0 (unregistering): Released all slaves [ 1030.452184] IPVS: ftp: loaded support on port[0] = 21 [ 1030.714543] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1031.519665] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1031.553885] team0: Port device team_slave_0 added [ 1031.690788] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1031.716885] team0: Port device team_slave_0 added [ 1031.770459] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1031.798446] team0: Port device team_slave_1 added [ 1031.934256] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1031.952136] team0: Port device team_slave_1 added [ 1031.996515] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1032.141525] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1032.148603] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1032.162343] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1032.225531] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1032.232634] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1032.253895] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1032.413608] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1032.422204] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1032.429307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1032.444311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1032.485186] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1032.513882] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1032.573052] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1032.583278] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1032.599918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1032.635682] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1032.643946] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1032.680123] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1032.790062] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1032.797670] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1032.813542] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1033.791241] bridge0: port 1(bridge_slave_0) entered blocking state [ 1033.797788] bridge0: port 1(bridge_slave_0) entered disabled state [ 1033.852268] device bridge_slave_0 entered promiscuous mode [ 1034.058541] bridge0: port 2(bridge_slave_1) entered blocking state [ 1034.065135] bridge0: port 2(bridge_slave_1) entered disabled state [ 1034.099115] IPVS: ftp: loaded support on port[0] = 21 [ 1034.105923] device bridge_slave_1 entered promiscuous mode [ 1034.161390] bridge0: port 1(bridge_slave_0) entered blocking state [ 1034.167881] bridge0: port 1(bridge_slave_0) entered disabled state [ 1034.195088] device bridge_slave_0 entered promiscuous mode [ 1034.285207] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1034.388770] bridge0: port 2(bridge_slave_1) entered blocking state [ 1034.395345] bridge0: port 2(bridge_slave_1) entered disabled state [ 1034.431100] device bridge_slave_1 entered promiscuous mode [ 1034.485000] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1034.630888] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1034.867795] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1034.992901] bridge0: port 2(bridge_slave_1) entered blocking state [ 1034.999509] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1035.006471] bridge0: port 1(bridge_slave_0) entered blocking state [ 1035.012939] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1035.120896] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1035.179486] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1035.197616] bridge0: port 2(bridge_slave_1) entered blocking state [ 1035.204135] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1035.211041] bridge0: port 1(bridge_slave_0) entered blocking state [ 1035.217618] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1035.237612] syz-executor6: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1035.249299] syz-executor6 cpuset=/ mems_allowed=0 [ 1035.254330] CPU: 0 PID: 31607 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 1035.261220] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1035.270624] Call Trace: [ 1035.273288] dump_stack+0x185/0x1d0 [ 1035.277001] warn_alloc+0x430/0x690 [ 1035.280711] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1035.285642] ? __msan_poison_alloca+0x15c/0x1d0 [ 1035.290413] copy_process+0x778/0x9be0 [ 1035.290602] syz-executor4 invoked oom-killer: gfp_mask=0x14082c2(GFP_KERNEL|__GFP_HIGHMEM|__GFP_NOWARN|__GFP_ZERO), nodemask=(null), order=0, oom_score_adj=0 [ 1035.294347] ? prepare_exit_to_usermode+0x271/0x3a0 [ 1035.294392] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 1035.308636] syz-executor4 cpuset= [ 1035.313634] ? do_signal+0x49f/0x1d20 [ 1035.313678] ? __msan_poison_alloca+0x141/0x1d0 [ 1035.313738] _do_fork+0x353/0xf60 [ 1035.319071] / [ 1035.322561] __x64_sys_clone+0x15e/0x1b0 [ 1035.326318] mems_allowed=0 [ 1035.330971] ? __ia32_sys_vfork+0x70/0x70 [ 1035.331012] do_syscall_64+0x15b/0x230 [ 1035.351269] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1035.356479] RIP: 0033:0x41f8b9 [ 1035.359681] RSP: 002b:0000000000a3fad0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1035.367402] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000041f8b9 [ 1035.374679] RDX: 0000000000a3fadc RSI: 0000000000000000 RDI: 0000000000100011 [ 1035.381959] RBP: 0000000000a3fc80 R08: 0000000000a44a60 R09: 0000000000000031 [ 1035.389247] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000a3fec8 [ 1035.396517] R13: 0000000000a3fe28 R14: 0000000000000000 R15: 0000000000000000 [ 1035.403820] CPU: 1 PID: 32347 Comm: syz-executor4 Not tainted 4.17.0+ #9 [ 1035.403907] warn_alloc_show_mem: 1 callbacks suppressed [ 1035.403915] Mem-Info: [ 1035.410773] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1035.410786] Call Trace: [ 1035.410833] dump_stack+0x185/0x1d0 [ 1035.410874] dump_header+0x2cc/0x16f0 [ 1035.416307] active_anon:127299 inactive_anon:77 isolated_anon:0 [ 1035.416307] active_file:1551 inactive_file:4945 isolated_file:64 [ 1035.416307] unevictable:0 dirty:5 writeback:0 unstable:0 [ 1035.416307] slab_reclaimable:3276 slab_unreclaimable:7895 [ 1035.416307] mapped:61517 shmem:83 pagetables:1029 bounce:0 [ 1035.416307] free:19285 free_pcp:411 free_cma:0 [ 1035.418650] ? __msan_poison_alloca+0x15c/0x1d0 [ 1035.418703] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1035.428122] Node 0 active_anon:509196kB inactive_anon:308kB active_file:6204kB inactive_file:19780kB unevictable:0kB isolated(anon):0kB isolated(file):256kB mapped:246068kB dirty:20kB writeback:0kB shmem:332kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 241664kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1035.430666] ? ___ratelimit+0x67f/0x760 [ 1035.430705] oom_kill_process+0x341/0x2160 [ 1035.434337] Node 0 [ 1035.438119] ? oom_evaluate_task+0x84a/0xb60 [ 1035.438220] out_of_memory+0x1700/0x1da0 [ 1035.471340] DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1035.475943] ? __udp4_lib_lookup+0x1540/0x28e0 [ 1035.475989] __alloc_pages_nodemask+0x4e4f/0x5cc0 [ 1035.481428] lowmem_reserve[]: [ 1035.509790] alloc_pages_current+0x6b1/0x970 [ 1035.509828] __vmalloc_node_range+0x83c/0x1170 [ 1035.513809] 0 [ 1035.518069] vmalloc_user+0xe1/0x3d0 [ 1035.518116] ? kcov_mmap+0x2a/0x120 [ 1035.520337] 2817 [ 1035.524739] ? kcov_ioctl+0x1d0/0x1d0 [ 1035.524783] kcov_mmap+0x2a/0x120 [ 1035.528833] 7244 [ 1035.555374] ? kcov_ioctl+0x1d0/0x1d0 [ 1035.555400] mmap_region+0x2751/0x3730 [ 1035.555470] do_mmap+0x1902/0x2010 [ 1035.560054] 7244 [ 1035.564902] vm_mmap_pgoff+0x31b/0x430 [ 1035.564964] ksys_mmap_pgoff+0xa5a/0xaf0 [ 1035.572464] __x64_sys_mmap+0x1f1/0x260 [ 1035.572500] ? align_vdso_addr+0x420/0x420 [ 1035.577094] Node 0 [ 1035.578871] do_syscall_64+0x15b/0x230 [ 1035.578918] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1035.582682] DMA32 free:43908kB min:26224kB low:32780kB high:39336kB active_anon:224264kB inactive_anon:0kB active_file:1612kB inactive_file:248kB unevictable:0kB writepending:68kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1408kB pagetables:1160kB bounce:0kB free_pcp:744kB local_pcp:28kB free_cma:0kB [ 1035.586218] RIP: 0033:0x455aea [ 1035.586233] RSP: 002b:00007ffec93d62d8 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 1035.588320] lowmem_reserve[]: [ 1035.592265] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000455aea [ 1035.592282] RDX: 0000000000000003 RSI: 0000000000200000 RDI: 0000000000000000 [ 1035.592308] RBP: 0000000000000009 R08: 0000000000000009 R09: 0000000000000000 [ 1035.595763] 0 [ 1035.597791] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000000 [ 1035.597808] R13: 0000000000200000 R14: 0000000000000001 R15: 0000000000000000 [ 1035.598134] Mem-Info: [ 1035.601673] 0 [ 1035.605640] active_anon:127299 inactive_anon:77 isolated_anon:0 [ 1035.605640] active_file:1551 inactive_file:4945 isolated_file:64 [ 1035.605640] unevictable:0 dirty:5 writeback:0 unstable:0 [ 1035.605640] slab_reclaimable:3276 slab_unreclaimable:7895 [ 1035.605640] mapped:61517 shmem:83 pagetables:1029 bounce:0 [ 1035.605640] free:19285 free_pcp:411 free_cma:0 [ 1035.609531] 4426 [ 1035.611643] Node 0 active_anon:509196kB inactive_anon:308kB active_file:6204kB inactive_file:19780kB unevictable:0kB isolated(anon):0kB isolated(file):256kB mapped:246068kB dirty:20kB writeback:0kB shmem:332kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 241664kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1035.611661] Node 0 [ 1035.615571] 4426 [ 1035.619782] DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1035.619797] lowmem_reserve[]: [ 1035.628230] 0 2817 [ 1035.630507] Node 0 [ 1035.634414] 7244 7244 [ 1035.639712] Normal free:17328kB min:41208kB low:51508kB high:61808kB active_anon:284868kB inactive_anon:308kB active_file:3796kB inactive_file:19868kB unevictable:0kB writepending:184kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8000kB pagetables:2956kB bounce:0kB free_pcp:900kB local_pcp:224kB free_cma:0kB [ 1035.671305] lowmem_reserve[]: [ 1035.679110] Node 0 DMA32 free:43908kB min:26224kB low:32780kB high:39336kB active_anon:224264kB inactive_anon:0kB active_file:1612kB inactive_file:248kB unevictable:0kB writepending:68kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1408kB pagetables:1160kB bounce:0kB free_pcp:744kB local_pcp:716kB free_cma:0kB [ 1035.682254] 0 [ 1035.689544] lowmem_reserve[]: 0 [ 1035.696883] 0 [ 1035.704168] 0 4426 [ 1035.706014] 0 [ 1035.713392] 4426 [ 1035.720794] 0 [ 1035.723234] Node 0 Normal free:17328kB min:41208kB low:51508kB high:61808kB active_anon:284868kB inactive_anon:308kB active_file:3796kB inactive_file:19868kB unevictable:0kB writepending:184kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8000kB pagetables:2956kB bounce:0kB free_pcp:900kB local_pcp:676kB free_cma:0kB [ 1035.758655] lowmem_reserve[]: 0 [ 1035.760771] Node 0 [ 1035.790020] 0 [ 1035.792281] DMA: [ 1035.794345] 0 0 [ 1035.819925] 0*4kB [ 1035.823401] Node 0 DMA: [ 1035.825686] 0*8kB [ 1035.827975] 0*4kB [ 1035.830499] 0*16kB [ 1035.859408] 0*8kB 0*16kB [ 1035.862569] 1*32kB [ 1035.892011] 1*32kB [ 1035.893831] (U) [ 1035.897116] (U) 2*64kB [ 1035.898975] 2*64kB [ 1035.901216] (U) 1*128kB [ 1035.903051] (U) [ 1035.905133] (U) 1*256kB [ 1035.907154] 1*128kB [ 1035.936722] (U) [ 1035.940025] (U) [ 1035.942267] 0*512kB 1*1024kB [ 1035.945439] 1*256kB [ 1035.947506] (U) 1*2048kB [ 1035.949516] (U) [ 1035.951667] (M) 3*4096kB [ 1035.954371] 0*512kB [ 1035.956533] (M) = 15904kB [ 1035.958719] 1*1024kB [ 1035.961046] Node 0 DMA32: [ 1035.963837] (U) [ 1035.966256] 149*4kB (UM) [ 1035.968527] 1*2048kB [ 1035.970500] 2438*8kB (ME) 646*16kB [ 1035.973122] (M) [ 1035.975359] (UM) 65*32kB [ 1035.978064] 3*4096kB [ 1035.980041] (UM) 4*64kB [ 1035.982743] (M) [ 1035.985071] (ME) 1*128kB [ 1035.987080] = 15904kB [ 1035.989057] (E) 5*256kB (UE) [ 1035.992202] Node 0 [ 1035.994531] 3*512kB (UE) [ 1035.997324] DMA32: [ 1035.999308] 2*1024kB (UE) [ 1036.002104] 149*4kB [ 1036.004434] 1*2048kB (U) [ 1036.007227] (UM) [ 1036.009727] 1*4096kB (M) [ 1036.012608] 2438*8kB [ 1036.014597] = 43908kB [ 1036.014612] Node 0 [ 1036.017408] (ME) [ 1036.019826] Normal: 748*4kB [ 1036.023494] 646*16kB [ 1036.025468] (ME) 121*8kB [ 1036.028286] (UM) [ 1036.030699] (UME) 28*16kB [ 1036.033418] 65*32kB [ 1036.035402] (MEH) 11*32kB [ 1036.038208] (UM) [ 1036.040628] (MEH) 4*64kB [ 1036.043785] 4*64kB [ 1036.046031] (MH) 14*128kB [ 1036.048847] (ME) [ 1036.051091] (MH) 17*256kB [ 1036.053989] 1*128kB [ 1036.056322] (UM) 7*512kB [ 1036.059117] (E) [ 1036.061186] (UMH) 3*1024kB [ 1036.064167] 5*256kB [ 1036.066586] (UMH) 0*2048kB [ 1036.069035] (UE) [ 1036.071280] 0*4096kB = 17816kB [ 1036.073380] 3*512kB [ 1036.076432] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1036.078856] (UE) [ 1036.081624] 6625 total pagecache pages [ 1036.081642] 0 pages in swap cache [ 1036.083728] 2*1024kB [ 1036.086585] Swap cache stats: add 0, delete 0, find 0/0 [ 1036.086603] Free swap = 0kB [ 1036.088964] (UE) [ 1036.091822] Total swap = 0kB [ 1036.093907] 1*2048kB [ 1036.096683] 1965969 pages RAM [ 1036.096701] 0 pages HighMem/MovableOnly [ 1036.098977] (U) [ 1036.101834] 106316 pages reserved [ 1036.101852] [ pid ] uid tgid total_vm rss pgtables_bytes swapents oom_score_adj name [ 1036.103933] 1*4096kB [ 1036.106874] [ 2269] 0 2269 5476 268 90112 0 -1000 udevd [ 1036.109164] (M) [ 1036.111971] [ 4239] 0 4239 2493 574 53248 0 0 dhclient [ 1036.113964] = 43908kB [ 1036.113980] Node 0 [ 1036.116963] [ 4388] 0 4388 30604 192 122880 0 0 rsyslogd [ 1036.119282] Normal: [ 1036.122250] [ 4431] 0 4431 4725 47 86016 0 0 cron [ 1036.122287] [ 4457] 0 4457 12490 152 139264 0 -1000 sshd [ 1036.124353] 748*4kB [ 1036.127571] [ 4481] 0 4481 3694 41 77824 0 0 getty [ 1036.127608] [ 4482] 0 4482 3694 41 77824 0 0 getty [ 1036.129937] (ME) [ 1036.138663] [ 4483] 0 4483 3694 41 73728 0 0 getty [ 1036.140737] 121*8kB [ 1036.144659] [ 4484] 0 4484 3694 40 69632 0 0 getty [ 1036.144696] [ 4485] 0 4485 3694 42 73728 0 0 getty [ 1036.148161] (UME) [ 1036.150618] [ 4486] 0 4486 3694 40 73728 0 0 getty [ 1036.156004] 28*16kB [ 1036.159052] [ 4487] 0 4487 3649 39 77824 0 0 getty [ 1036.159090] [ 4502] 0 4502 17821 213 192512 0 0 sshd [ 1036.161150] (MEH) [ 1036.164195] [ 4504] 0 4504 250128 130107 1605632 0 0 syz-fuzzer [ 1036.164239] [31527] 0 31527 5475 270 86016 0 -1000 udevd [ 1036.166640] 11*32kB [ 1036.169782] [31530] 0 31530 5475 270 86016 0 -1000 udevd [ 1036.169820] [31589] 0 31589 17553 14 114688 0 0 syz-executor6 [ 1036.173790] (MEH) [ 1036.175796] [31607] 0 31607 17553 8323 114688 0 0 syz-executor6 [ 1036.175834] [31900] 0 31900 17553 14 114688 0 0 syz-executor1 [ 1036.179300] 4*64kB [ 1036.187926] [31902] 0 31902 17553 14 110592 0 0 syz-executor2 [ 1036.190336] (MH) [ 1036.198515] [31924] 0 31924 17553 8228 110592 0 0 syz-executor2 [ 1036.198555] [31925] 0 31925 17553 8291 114688 0 0 syz-executor1 [ 1036.200543] 14*128kB [ 1036.209017] [32093] 0 32093 17553 15 114688 0 0 syz-executor5 [ 1036.211424] (MH) [ 1036.213685] [32095] 0 32095 17553 16 118784 0 0 syz-executor7 [ 1036.213725] [32118] 0 32118 17553 8211 114688 0 0 syz-executor5 [ 1036.222130] 17*256kB [ 1036.224480] [32119] 0 32119 17553 8212 118784 0 0 syz-executor7 [ 1036.224523] [32267] 0 32267 17553 224 118784 0 0 syz-executor3 [ 1036.232577] (UM) [ 1036.240686] [32344] 0 32344 1050 123 49152 0 0 sh [ 1036.243011] 7*512kB [ 1036.251204] [32346] 0 32346 12433 226 73728 0 0 syz-executor0 [ 1036.259359] (UMH) [ 1036.261460] [32347] 0 32347 12433 226 77824 0 0 syz-executor4 [ 1036.261498] [32351] 0 32351 1050 122 53248 0 0 sh [ 1036.269758] 3*1024kB [ 1036.272110] [32353] 0 32353 18486 344 65536 0 0 ip [ 1036.272150] [32356] 0 32356 1050 23 53248 0 0 sh [ 1036.280296] (UMH) [ 1036.288464] Out of memory: Kill process 4504 (syz-fuzzer) score 70 or sacrifice child [ 1036.288570] Killed process 32267 (syz-executor3) total-vm:70212kB, anon-rss:56kB, file-rss:840kB, shmem-rss:0kB [ 1036.290663] 0*2048kB [ 1036.343888] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1036.347194] 0*4096kB = 17816kB [ 1036.347237] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1036.356302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1036.358275] 6074 total pagecache pages [ 1036.358287] 0 pages in swap cache [ 1036.358300] Swap cache stats: add 0, delete 0, find 0/0 [ 1036.358320] Free swap = 0kB [ 1036.582726] Total swap = 0kB [ 1036.585849] 1965969 pages RAM [ 1036.589013] 0 pages HighMem/MovableOnly [ 1036.593046] 106316 pages reserved [ 1036.598232] syz-executor2: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1036.609641] syz-executor2 cpuset=/ mems_allowed=0 [ 1036.614704] CPU: 0 PID: 31924 Comm: syz-executor2 Not tainted 4.17.0+ #9 [ 1036.621760] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1036.631183] Call Trace: [ 1036.633862] dump_stack+0x185/0x1d0 [ 1036.637571] warn_alloc+0x430/0x690 [ 1036.641284] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1036.646218] ? __msan_poison_alloca+0x15c/0x1d0 [ 1036.651002] copy_process+0x778/0x9be0 [ 1036.654961] ? prepare_exit_to_usermode+0x271/0x3a0 [ 1036.660049] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 1036.665476] ? do_signal+0x49f/0x1d20 [ 1036.669366] ? __msan_poison_alloca+0x141/0x1d0 [ 1036.674123] _do_fork+0x353/0xf60 [ 1036.677669] __x64_sys_clone+0x15e/0x1b0 [ 1036.681788] ? __ia32_sys_vfork+0x70/0x70 [ 1036.685983] do_syscall_64+0x15b/0x230 [ 1036.689935] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1036.695266] RIP: 0033:0x41f8b9 [ 1036.698523] RSP: 002b:0000000000a3fad0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1036.706288] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000041f8b9 [ 1036.713606] RDX: 0000000000a3fadc RSI: 0000000000000000 RDI: 0000000000100011 [ 1036.720924] RBP: 0000000000a3fc80 R08: 0000000000a44a60 R09: 0000000000000028 [ 1036.728251] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000a3fe80 [ 1036.735566] R13: 0000000000a3fe28 R14: 0000000000000000 R15: 0000000000000000 [ 1036.743472] Mem-Info: [ 1036.746058] active_anon:127244 inactive_anon:77 isolated_anon:0 [ 1036.746058] active_file:656 inactive_file:650 isolated_file:57 [ 1036.746058] unevictable:0 dirty:26 writeback:0 unstable:0 [ 1036.746058] slab_reclaimable:3276 slab_unreclaimable:7904 [ 1036.746058] mapped:57062 shmem:83 pagetables:989 bounce:0 [ 1036.746058] free:24077 free_pcp:172 free_cma:0 [ 1036.779311] Node 0 active_anon:508976kB inactive_anon:308kB active_file:2148kB inactive_file:2160kB unevictable:0kB isolated(anon):0kB isolated(file):228kB mapped:227668kB dirty:104kB writeback:0kB shmem:332kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 241664kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1036.807763] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1036.834132] lowmem_reserve[]: 0 2817 7244 7244 [ 1036.838846] Node 0 DMA32 free:44320kB min:26224kB low:32780kB high:39336kB active_anon:224276kB inactive_anon:0kB active_file:596kB inactive_file:1176kB unevictable:0kB writepending:140kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1216kB pagetables:1000kB bounce:0kB free_pcp:488kB local_pcp:0kB free_cma:0kB [ 1036.867902] lowmem_reserve[]: 0 0 4426 4426 [ 1036.872375] Node 0 Normal free:37596kB min:41208kB low:51508kB high:61808kB active_anon:284868kB inactive_anon:308kB active_file:1356kB inactive_file:1444kB unevictable:0kB writepending:196kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8000kB pagetables:2956kB bounce:0kB free_pcp:552kB local_pcp:0kB free_cma:0kB [ 1036.902086] lowmem_reserve[]: 0 0 0 0 [ 1036.906171] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 1036.919661] Node 0 DMA32: 146*4kB (UM) 2516*8kB (ME) 645*16kB (M) 64*32kB (M) 5*64kB (UME) 2*128kB (UE) 2*256kB (UE) 3*512kB (UE) 2*1024kB (UE) 1*2048kB (U) 1*4096kB (M) = 43896kB [ 1036.936215] Node 0 Normal: 2122*4kB (UME) 1159*8kB (ME) 353*16kB (UMEH) 63*32kB (UMEH) 16*64kB (UMH) 18*128kB (MH) 5*256kB (M) 8*512kB (UMH) 3*1024kB (UMH) 0*2048kB 0*4096kB = 37200kB [ 1036.953163] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1036.961844] 985 total pagecache pages [ 1036.965743] 0 pages in swap cache [ 1036.969285] Swap cache stats: add 0, delete 0, find 0/0 [ 1036.974743] Free swap = 0kB [ 1036.977828] Total swap = 0kB [ 1036.980021] kthreadd: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1036.980899] 1965969 pages RAM [ 1036.991805] kthreadd cpuset= [ 1036.994893] 0 pages HighMem/MovableOnly [ 1036.994897] / mems_allowed=0 [ 1036.997995] 106316 pages reserved [ 1037.002012] CPU: 1 PID: 2 Comm: kthreadd Not tainted 4.17.0+ #9 [ 1037.014521] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1037.023916] Call Trace: [ 1037.026567] dump_stack+0x185/0x1d0 [ 1037.030250] warn_alloc+0x430/0x690 [ 1037.033921] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1037.038802] ? __msan_poison_alloca+0x15c/0x1d0 [ 1037.043533] copy_process+0x778/0x9be0 [ 1037.047442] ? __list_add_valid+0xb8/0x450 [ 1037.051708] ? pick_next_task_fair+0x22c9/0x2530 [ 1037.056492] ? kthread_blkcg+0xf0/0xf0 [ 1037.060406] ? __msan_poison_alloca+0x140/0x1d0 [ 1037.065090] _do_fork+0x353/0xf60 [ 1037.068577] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 1037.073970] ? balance_callback+0x48/0x260 [ 1037.078229] ? kthread_blkcg+0xf0/0xf0 [ 1037.082134] kernel_thread+0xc6/0xe0 [ 1037.085852] ? kthread_blkcg+0xf0/0xf0 [ 1037.089751] kthreadd+0x5df/0x940 [ 1037.093218] ? kthread_stop+0x680/0x680 [ 1037.097201] ret_from_fork+0x35/0x40 [ 1037.101721] BUG: unable to handle kernel NULL pointer dereference at 00000000000008cc [ 1037.109737] PGD 80000001a6f40067 P4D 80000001a6f40067 PUD 1b797b067 PMD 0 [ 1037.116765] Oops: 0002 [#1] SMP PTI [ 1037.120551] Dumping ftrace buffer: [ 1037.124069] (ftrace buffer empty) [ 1037.127766] Modules linked in: [ 1037.130948] CPU: 1 PID: 29872 Comm: kworker/1:1 Not tainted 4.17.0+ #9 [ 1037.137599] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1037.146969] RIP: 0010:memset_erms+0x9/0x10 [ 1037.151198] RSP: 0018:ffff88010f1afa50 EFLAGS: 00010046 [ 1037.156549] RAX: 0000000000000000 RBX: ffff88009083ba80 RCX: 0000000000000fb0 [ 1037.163799] RDX: 0000000000000fb0 RSI: 0000000000000000 RDI: 00000000000008cc [ 1037.171060] RBP: ffff88010f1afa80 R08: 0000000100400040 R09: 00000000000008cc [ 1037.178313] R10: 0000000000000000 R11: 0000000100400040 R12: ffff88009083c358 [ 1037.185565] R13: 0000000000000000 R14: 0000000000000282 R15: fffffffffffffff4 [ 1037.192822] FS: 0000000000000000(0000) GS:ffff88021fd00000(0000) knlGS:0000000000000000 [ 1037.201028] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1037.207070] CR2: 00000000000000b0 CR3: 00000001a6f4c000 CR4: 00000000001406e0 [ 1037.214330] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1037.221582] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1037.228832] Call Trace: [ 1037.231426] ? kmsan_thread_create+0x56/0xb0 [ 1037.235834] __kthread_create_on_node+0x6ba/0x7b0 [ 1037.240689] kthread_create_on_node+0x243/0x270 [ 1037.245358] ? process_one_work+0x1fa0/0x1fa0 [ 1037.249843] create_worker+0x7c6/0x1000 [ 1037.253807] worker_thread+0x876/0x24f0 [ 1037.257782] kthread+0x4db/0x6c0 [ 1037.261139] ? process_one_work+0x1fa0/0x1fa0 [ 1037.265622] ? kthread_blkcg+0xf0/0xf0 [ 1037.269497] ret_from_fork+0x35/0x40 [ 1037.273190] Code: 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 f3 48 ab 89 d1 f3 aa 4c 89 c8 c3 90 49 89 f9 40 88 f0 48 89 d1 aa 4c 89 c8 c3 90 49 89 fa 40 0f b6 ce 48 b8 01 01 01 01 01 [ 1037.292410] RIP: memset_erms+0x9/0x10 RSP: ffff88010f1afa50 [ 1037.298101] CR2: 00000000000008cc [ 1037.301554] ---[ end trace 7356073c876a3666 ]--- [ 1037.306300] Kernel panic - not syncing: Fatal exception [ 1037.312344] Dumping ftrace buffer: [ 1037.315874] (ftrace buffer empty) [ 1037.319564] Kernel Offset: disabled [ 1037.323174] Rebooting in 86400 seconds..