ckname(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @dev}}}, &(0x7f0000000080)=0x80) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f00000000c0), 0x4) 04:39:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000040)) 04:39:24 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050253}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) [ 509.958795] audit: type=1326 audit(1529728763.957:700): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=32183 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:39:24 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050253}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) 04:39:24 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000080)) 04:39:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) 04:39:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000200)) 04:39:24 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023e}]}) seccomp(0x0, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000080)) 04:39:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f00000000c0), 0x4) 04:39:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000040)) 04:39:24 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050253}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) 04:39:24 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}}) 04:39:24 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) pipe2(&(0x7f0000000000), 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) 04:39:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) 04:39:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000200)) 04:39:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) 04:39:24 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023e}]}) seccomp(0x0, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000080)) 04:39:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f00000000c0), 0x4) 04:39:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000040)) 04:39:24 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}}) [ 510.935688] audit: type=1326 audit(1529728764.934:701): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=32252 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:39:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f00000000c0), 0x4) 04:39:25 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023e}]}) seccomp(0x0, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000080)) 04:39:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) 04:39:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000040)) 04:39:25 executing program 0: shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) 04:39:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000200)) 04:39:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}}) 04:39:25 executing program 2: getsockname(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @dev}}}, &(0x7f0000000080)=0x80) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f00000000c0), 0x4) 04:39:25 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) pipe2(&(0x7f0000000000), 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) 04:39:25 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000080)) 04:39:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) 04:39:25 executing program 0: shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) 04:39:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]}) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000040)) 04:39:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000200)) 04:39:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}}) 04:39:25 executing program 2: getsockname(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @dev}}}, &(0x7f0000000080)=0x80) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f00000000c0), 0x4) [ 511.884826] audit: type=1326 audit(1529728765.883:702): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=32292 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:39:25 executing program 0: shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) 04:39:26 executing program 2: getsockname(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @dev}}}, &(0x7f0000000080)=0x80) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f00000000c0), 0x4) [ 511.952094] audit: type=1326 audit(1529728765.933:703): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=32301 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:39:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x40000000050253}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) 04:39:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]}) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000040)) 04:39:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000200)) 04:39:26 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) 04:39:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}}) 04:39:26 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]}) getsockname(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @dev}}}, &(0x7f0000000080)=0x80) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f00000000c0), 0x4) 04:39:26 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000080)) 04:39:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x40000000050253}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) 04:39:26 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) 04:39:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]}) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000040)) 04:39:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000200)) 04:39:26 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]}) getsockname(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @dev}}}, &(0x7f0000000080)=0x80) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f00000000c0), 0x4) 04:39:26 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5021a}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) msgrcv(0x0, &(0x7f0000000040)={0x0, ""/27}, 0x23, 0x0, 0x0) 04:39:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}}) [ 512.881139] audit: type=1326 audit(1529728766.879:704): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=32336 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:39:26 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]}) getsockname(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @dev}}}, &(0x7f0000000080)=0x80) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f00000000c0), 0x4) 04:39:26 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) 04:39:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x40000000050253}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) 04:39:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}}) 04:39:27 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000040)) 04:39:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000200)) 04:39:27 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5021a}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) msgrcv(0x0, &(0x7f0000000040)={0x0, ""/27}, 0x23, 0x0, 0x0) 04:39:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000140)}) getsockname(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @dev}}}, &(0x7f0000000080)=0x80) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f00000000c0), 0x4) 04:39:27 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000080)) 04:39:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) 04:39:27 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000040)) 04:39:27 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5021a}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) msgrcv(0x0, &(0x7f0000000040)={0x0, ""/27}, 0x23, 0x0, 0x0) 04:39:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000140)}) getsockname(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @dev}}}, &(0x7f0000000080)=0x80) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f00000000c0), 0x4) 04:39:27 executing program 5: openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000200)) 04:39:27 executing program 4: shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}}) 04:39:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) [ 513.820525] audit: type=1326 audit(1529728767.819:705): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=32386 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:39:27 executing program 5: openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000200)) 04:39:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000140)}) getsockname(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @dev}}}, &(0x7f0000000080)=0x80) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f00000000c0), 0x4) 04:39:27 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000040)) [ 513.883778] audit: type=1326 audit(1529728767.867:706): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=32401 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:39:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) 04:39:27 executing program 4: shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}}) 04:39:28 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5021a}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) msgrcv(0x0, &(0x7f0000000040)={0x0, ""/27}, 0x23, 0x0, 0x0) 04:39:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5022b}]}) getsockname(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @dev}}}, &(0x7f0000000080)=0x80) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f00000000c0), 0x4) 04:39:28 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000040)) 04:39:28 executing program 5: openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000200)) 04:39:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) 04:39:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) 04:39:28 executing program 4: shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}}) 04:39:28 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5021a}]}) msgrcv(0x0, &(0x7f0000000040)={0x0, ""/27}, 0x23, 0x0, 0x0) 04:39:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5022b}]}) getsockname(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @dev}}}, &(0x7f0000000080)=0x80) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f00000000c0), 0x4) 04:39:28 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000040)) 04:39:28 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000200)) 04:39:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050253}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) [ 514.812620] audit: type=1326 audit(1529728768.811:707): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=32444 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:39:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501df}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) 04:39:28 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}}) 04:39:28 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000200)) 04:39:28 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000040)) 04:39:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5022b}]}) getsockname(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @dev}}}, &(0x7f0000000080)=0x80) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f00000000c0), 0x4) 04:39:29 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5021a}]}) msgrcv(0x0, &(0x7f0000000040)={0x0, ""/27}, 0x23, 0x0, 0x0) 04:39:29 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000200)) 04:39:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000140)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000040)) 04:39:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) 04:39:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501df}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) 04:39:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050253}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:39:29 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6}]}) getsockname(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @dev}}}, &(0x7f0000000080)=0x80) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f00000000c0), 0x4) 04:39:29 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}}) 04:39:29 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5021a}]}) msgrcv(0x0, &(0x7f0000000040)={0x0, ""/27}, 0x23, 0x0, 0x0) 04:39:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000200)) 04:39:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000140)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000040)) [ 515.752214] audit: type=1326 audit(1529728769.750:708): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=32490 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:39:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000140)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000040)) [ 515.811416] audit: type=1326 audit(1529728769.780:709): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=32494 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:39:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501df}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) 04:39:29 executing program 6: openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) msgrcv(0x0, &(0x7f0000000040)={0x0, ""/27}, 0x23, 0x0, 0x0) 04:39:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000200)) 04:39:29 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}}) 04:39:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050253}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:39:30 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5022b}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000040)) 04:39:30 executing program 6: openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) msgrcv(0x0, &(0x7f0000000040)={0x0, ""/27}, 0x23, 0x0, 0x0) 04:39:30 executing program 6: openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) msgrcv(0x0, &(0x7f0000000040)={0x0, ""/27}, 0x23, 0x0, 0x0) 04:39:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}}) 04:39:30 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) 04:39:30 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6}]}) getsockname(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @dev}}}, &(0x7f0000000080)=0x80) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f00000000c0), 0x4) 04:39:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000200)) 04:39:30 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5022b}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000040)) 04:39:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050253}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:39:30 executing program 3: 04:39:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}}) [ 516.685108] audit: type=1326 audit(1529728770.682:710): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=32540 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:39:30 executing program 3: 04:39:30 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5021a}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) msgrcv(0x0, &(0x7f0000000040)={0x0, ""/27}, 0x23, 0x0, 0x0) [ 516.793623] audit: type=1326 audit(1529728770.792:711): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=32552 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:39:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}}) 04:39:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000200)) 04:39:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050253}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:39:30 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5022b}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000040)) 04:39:30 executing program 3: 04:39:31 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5021a}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) msgrcv(0x0, &(0x7f0000000040)={0x0, ""/27}, 0x23, 0x0, 0x0) 04:39:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501df}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}}) 04:39:31 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) [ 517.611897] audit: type=1326 audit(1529728771.610:712): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=32591 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:39:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050253}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:39:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6}]}) getsockname(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @dev}}}, &(0x7f0000000080)=0x80) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f00000000c0), 0x4) 04:39:31 executing program 3: 04:39:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000040)) 04:39:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000200)) 04:39:31 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5021a}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) msgrcv(0x0, &(0x7f0000000040)={0x0, ""/27}, 0x23, 0x0, 0x0) 04:39:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501df}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}}) [ 517.714846] audit: type=1326 audit(1529728771.713:713): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=32598 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:39:31 executing program 3: 04:39:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000200)) [ 517.788459] audit: type=1326 audit(1529728771.741:714): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=32603 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:39:31 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) msgrcv(0x0, &(0x7f0000000040)={0x0, ""/27}, 0x23, 0x0, 0x0) 04:39:31 executing program 3: 04:39:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501df}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}}) 04:39:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050253}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:39:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000200)) 04:39:32 executing program 3: [ 518.107732] audit: type=1326 audit(1529728772.106:715): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=32627 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:39:32 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) 04:39:32 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) msgrcv(0x0, &(0x7f0000000040)={0x0, ""/27}, 0x23, 0x0, 0x0) [ 518.552333] audit: type=1326 audit(1529728772.550:716): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=32638 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:39:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000040)) 04:39:32 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:39:32 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) msgrcv(0x0, &(0x7f0000000040)={0x0, ""/27}, 0x23, 0x0, 0x0) 04:39:32 executing program 3: 04:39:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}}) 04:39:32 executing program 2: 04:39:32 executing program 3: 04:39:32 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5021a}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) msgrcv(0x0, &(0x7f0000000040)={0x0, ""/27}, 0x23, 0x0, 0x0) 04:39:32 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:39:32 executing program 2: 04:39:32 executing program 3: 04:39:32 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5021a}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) msgrcv(0x0, &(0x7f0000000040)={0x0, ""/27}, 0x23, 0x0, 0x0) 04:39:33 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000200)) 04:39:33 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:39:33 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050253}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:39:33 executing program 3: 04:39:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000040)) 04:39:33 executing program 2: 04:39:33 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5021a}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) msgrcv(0x0, &(0x7f0000000040)={0x0, ""/27}, 0x23, 0x0, 0x0) 04:39:33 executing program 0: 04:39:33 executing program 3: 04:39:33 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050253}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:39:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}}) 04:39:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e2}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) 04:39:33 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 04:39:33 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getgid() 04:39:33 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050253}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:39:33 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) msgrcv(0x0, &(0x7f0000000040)={0x0, ""/27}, 0x23, 0x0, 0x0) [ 519.883679] kauditd_printk_skb: 5 callbacks suppressed [ 519.883703] audit: type=1326 audit(1529728773.882:722): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=32714 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:39:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000200)) 04:39:34 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e2}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) 04:39:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:39:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)={0x303, 0x33}, 0x4) [ 520.090249] audit: type=1326 audit(1529728774.089:723): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=32731 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:39:34 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}}) 04:39:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 04:39:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:39:34 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e2}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) 04:39:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)={0x303, 0x33}, 0x4) 04:39:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20) [ 520.630984] audit: type=1326 audit(1529728774.626:724): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=32740 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:39:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:39:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)={0x303, 0x33}, 0x4) 04:39:34 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e2}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) 04:39:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 04:39:34 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) msgrcv(0x0, &(0x7f0000000040)={0x0, ""/27}, 0x23, 0x0, 0x0) 04:39:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20) [ 520.958226] audit: type=1326 audit(1529728774.956:725): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=302 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:39:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)={0x303, 0x33}, 0x4) 04:39:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x40000000050253}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:39:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e2}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) 04:39:35 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000040)) 04:39:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x40000000050253}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:39:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 04:39:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20) 04:39:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e2}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) 04:39:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)={0x303, 0x33}, 0x4) 04:39:35 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000040)) 04:39:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000240)}) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/50, &(0x7f00000000c0)=0x32) 04:39:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x40000000050253}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:39:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) ioprio_set$pid(0x0, 0x0, 0x0) 04:39:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e2}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) 04:39:35 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) msgrcv(0x0, &(0x7f0000000040)={0x0, ""/27}, 0x23, 0x0, 0x0) 04:39:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)={0x303, 0x33}, 0x4) 04:39:35 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000040)) 04:39:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20) 04:39:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000240)}) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/50, &(0x7f00000000c0)=0x32) 04:39:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:39:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) ioprio_set$pid(0x0, 0x0, 0x0) 04:39:36 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) [ 521.979229] audit: type=1326 audit(1529728775.977:726): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=370 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:39:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000240)}) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/50, &(0x7f00000000c0)=0x32) 04:39:36 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)={0x303, 0x33}, 0x4) [ 522.053812] audit: type=1326 audit(1529728776.009:727): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=369 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:39:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20) 04:39:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) ioprio_set$pid(0x0, 0x0, 0x0) 04:39:36 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000040)) 04:39:36 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) 04:39:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000240)}) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/50, &(0x7f00000000c0)=0x32) 04:39:36 executing program 0: openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)={0x303, 0x33}, 0x4) 04:39:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]}) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/50, &(0x7f00000000c0)=0x32) 04:39:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20) 04:39:36 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 04:39:36 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) 04:39:36 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000040)) 04:39:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:39:36 executing program 0: openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)={0x303, 0x33}, 0x4) 04:39:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) [ 522.977971] audit: type=1326 audit(1529728776.976:728): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=421 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:39:37 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 04:39:37 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e2}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) 04:39:37 executing program 0: openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)={0x303, 0x33}, 0x4) 04:39:37 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000040)) 04:39:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]}) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/50, &(0x7f00000000c0)=0x32) 04:39:37 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20) 04:39:37 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 04:39:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f0000000580)='./file0\x00', 0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00') 04:39:37 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e2}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) 04:39:37 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)={0x303, 0x33}, 0x4) 04:39:37 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000040)) 04:39:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]}) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/50, &(0x7f00000000c0)=0x32) 04:39:37 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20) 04:39:37 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e2}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) 04:39:37 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:39:37 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 04:39:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f0000000580)='./file0\x00', 0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00') 04:39:37 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)={0x303, 0x33}, 0x4) 04:39:37 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20) 04:39:37 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000040)) 04:39:37 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000240)}) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/50, &(0x7f00000000c0)=0x32) [ 523.953752] audit: type=1326 audit(1529728777.952:729): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=494 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:39:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) 04:39:38 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 04:39:38 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)={0x303, 0x33}, 0x4) 04:39:38 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000240)}) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/50, &(0x7f00000000c0)=0x32) 04:39:38 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20) 04:39:38 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000040)) 04:39:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f0000000580)='./file0\x00', 0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00') 04:39:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) 04:39:38 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000240)}) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/50, &(0x7f00000000c0)=0x32) 04:39:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)={0x303, 0x33}, 0x4) 04:39:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f0000000580)='./file0\x00', 0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00') 04:39:38 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 04:39:38 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20) 04:39:38 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000040)) 04:39:38 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000240)}) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/50, &(0x7f00000000c0)=0x32) 04:39:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) 04:39:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 04:39:39 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20) 04:39:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)={0x303, 0x33}, 0x4) 04:39:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 04:39:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e2}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) 04:39:39 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000240)}) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/50, &(0x7f00000000c0)=0x32) 04:39:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]}) symlinkat(&(0x7f0000000580)='./file0\x00', 0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00') 04:39:39 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000040)) 04:39:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 04:39:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e2}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) 04:39:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)={0x303, 0x33}, 0x4) 04:39:39 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20) 04:39:39 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000240)}) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/50, &(0x7f00000000c0)=0x32) 04:39:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 04:39:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]}) symlinkat(&(0x7f0000000580)='./file0\x00', 0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00') 04:39:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e2}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) 04:39:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 04:39:39 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000040)) 04:39:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000240)}) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/50, &(0x7f00000000c0)=0x32) 04:39:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)={0x303, 0x33}, 0x4) 04:39:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 04:39:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20) 04:39:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]}) symlinkat(&(0x7f0000000580)='./file0\x00', 0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00') 04:39:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000240)}) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/50, &(0x7f00000000c0)=0x32) 04:39:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) 04:39:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 04:39:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)={0x303, 0x33}, 0x4) 04:39:39 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000040)) 04:39:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 04:39:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20) [ 525.865853] audit: type=1326 audit(1529728779.864:730): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=629 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:39:39 executing program 6: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f0000000580)='./file0\x00', 0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00') 04:39:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000240)}) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/50, &(0x7f00000000c0)=0x32) 04:39:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 04:39:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 04:39:40 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)={0x303, 0x33}, 0x4) 04:39:40 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000040)) 04:39:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20) 04:39:40 executing program 6: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f0000000580)='./file0\x00', 0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00') 04:39:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50358}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000240)}) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/50, &(0x7f00000000c0)=0x32) 04:39:40 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)={0x303, 0x33}, 0x4) [ 526.440499] audit: type=1326 audit(1529728780.439:731): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=677 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:39:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) 04:39:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 04:39:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 04:39:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20) 04:39:40 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000040)) 04:39:40 executing program 6: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f0000000580)='./file0\x00', 0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00') 04:39:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50358}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000240)}) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/50, &(0x7f00000000c0)=0x32) [ 526.826762] audit: type=1326 audit(1529728780.824:732): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=696 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:39:40 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f0000000580)='./file0\x00', 0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00') 04:39:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20) 04:39:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50358}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000240)}) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/50, &(0x7f00000000c0)=0x32) 04:39:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 04:39:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 04:39:40 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000040)) [ 527.025232] audit: type=1326 audit(1529728781.023:733): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=711 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:39:41 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f0000000580)='./file0\x00', 0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00') 04:39:41 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20) 04:39:41 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)={0x303, 0x33}, 0x4) [ 527.348851] audit: type=1326 audit(1529728781.347:734): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=734 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:39:41 executing program 7: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 04:39:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) 04:39:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000240)}) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/50, &(0x7f00000000c0)=0x32) 04:39:41 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000040)) 04:39:41 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f0000000580)='./file0\x00', 0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00') 04:39:41 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20) [ 527.762489] audit: type=1326 audit(1529728781.761:735): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=741 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 527.807025] audit: type=1326 audit(1529728781.787:736): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=739 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:39:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f0000000580)='./file0\x00', 0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00') 04:39:41 executing program 7: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 04:39:41 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000040)) [ 527.842425] audit: type=1326 audit(1529728781.826:737): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=751 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:39:41 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 04:39:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f0000000580)='./file0\x00', 0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00') 04:39:42 executing program 7: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 04:39:42 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) [ 528.065568] audit: type=1326 audit(1529728782.063:738): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=768 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:39:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f0000000580)='./file0\x00', 0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00') 04:39:42 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000040)) 04:39:42 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)={0x303, 0x33}, 0x4) 04:39:42 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) [ 528.360953] audit: type=1326 audit(1529728782.359:739): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=792 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:39:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000240)}) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/50, &(0x7f00000000c0)=0x32) 04:39:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x5000c}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f0000000580)='./file0\x00', 0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00') 04:39:42 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000040)) 04:39:42 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 04:39:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4080000000000006, 0x0, 0x0, 0x800050209}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0) shmctl$IPC_RMID(0x0, 0x0) 04:39:42 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20) 04:39:42 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 04:39:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x5000c}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f0000000580)='./file0\x00', 0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00') 04:39:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 04:39:42 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 04:39:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x5000c}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f0000000580)='./file0\x00', 0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00') 04:39:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4080000000000006, 0x0, 0x0, 0x800050209}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0) shmctl$IPC_RMID(0x0, 0x0) 04:39:43 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f0000000580)='./file0\x00', 0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00') 04:39:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 04:39:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 04:39:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4080000000000006, 0x0, 0x0, 0x800050209}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0) shmctl$IPC_RMID(0x0, 0x0) 04:39:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000240)}) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/50, &(0x7f00000000c0)=0x32) 04:39:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') 04:39:43 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000040)) 04:39:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 04:39:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4080000000000006, 0x0, 0x0, 0x800050209}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0) shmctl$IPC_RMID(0x0, 0x0) 04:39:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20) 04:39:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') 04:39:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 04:39:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 04:39:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4080000000000006, 0x0, 0x0, 0x800050209}]}) shmctl$IPC_RMID(0x0, 0x0) 04:39:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') 04:39:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) 04:39:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f0000000580)='./file0\x00', 0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00') 04:39:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4080000000000006, 0x0, 0x0, 0x800050209}]}) shmctl$IPC_RMID(0x0, 0x0) 04:39:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') 04:39:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) 04:39:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) 04:39:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4080000000000006, 0x0, 0x0, 0x800050209}]}) shmctl$IPC_RMID(0x0, 0x0) 04:39:44 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000040)) 04:39:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) renameat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') 04:39:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 04:39:44 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0) shmctl$IPC_RMID(0x0, 0x0) 04:39:44 executing program 1: seccomp(0x10000000001, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) remap_file_pages(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) 04:39:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) 04:39:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 04:39:44 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0) shmctl$IPC_RMID(0x0, 0x0) 04:39:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) renameat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') 04:39:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x0) [ 531.029599] kauditd_printk_skb: 11 callbacks suppressed [ 531.029622] audit: type=1326 audit(1529728785.028:751): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=950 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:39:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f0000000580)='./file0\x00', 0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00') 04:39:45 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 04:39:45 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0) shmctl$IPC_RMID(0x0, 0x0) 04:39:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) 04:39:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) renameat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') [ 531.189571] audit: type=1326 audit(1529728785.187:752): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=962 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:39:45 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4080000000000006, 0x0, 0x0, 0x800050209}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0) shmctl$IPC_RMID(0x0, 0x0) 04:39:45 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x0) 04:39:45 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 04:39:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) 04:39:45 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') 04:39:45 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4080000000000006, 0x0, 0x0, 0x800050209}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0) shmctl$IPC_RMID(0x0, 0x0) 04:39:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x8000502ae}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) 04:39:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 04:39:45 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4080000000000006, 0x0, 0x0, 0x800050209}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0) shmctl$IPC_RMID(0x0, 0x0) 04:39:45 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') 04:39:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) [ 532.026022] audit: type=1326 audit(1529728786.024:753): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=1009 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:39:46 executing program 3: syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) 04:39:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x8000502ae}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) 04:39:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x0) 04:39:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) sched_getaffinity(0x0, 0x8, &(0x7f00000000c0)) 04:39:46 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') 04:39:46 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 04:39:46 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0) shmctl$IPC_RMID(0x0, 0x0) 04:39:46 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') 04:39:46 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0) shmctl$IPC_RMID(0x0, 0x0) 04:39:46 executing program 3: syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) 04:39:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x0) 04:39:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x8000502ae}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) 04:39:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x8000502ae}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) 04:39:46 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) 04:39:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) sched_getaffinity(0x0, 0x8, &(0x7f00000000c0)) 04:39:46 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') 04:39:46 executing program 3: syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) 04:39:46 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0) shmctl$IPC_RMID(0x0, 0x0) 04:39:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280), 0x4) 04:39:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x0) 04:39:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0) shmctl$IPC_RMID(0x0, 0x0) 04:39:47 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) 04:39:47 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') 04:39:47 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x8000502ae}]}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) 04:39:47 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) 04:39:47 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) sched_getaffinity(0x0, 0x8, &(0x7f00000000c0)) 04:39:47 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x0) 04:39:47 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280), 0x4) 04:39:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0) shmctl$IPC_RMID(0x0, 0x0) 04:39:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') 04:39:47 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) 04:39:47 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x8000502ae}]}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) 04:39:47 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) sched_getaffinity(0x0, 0x8, &(0x7f00000000c0)) 04:39:47 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) 04:39:47 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x0) 04:39:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') 04:39:47 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280), 0x4) 04:39:47 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) 04:39:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0) shmctl$IPC_RMID(0x0, 0x0) 04:39:47 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x8000502ae}]}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) 04:39:47 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) sched_getaffinity(0x0, 0x8, &(0x7f00000000c0)) 04:39:47 executing program 4: openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 04:39:47 executing program 1: ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x0) 04:39:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') 04:39:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4080000000000006}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0) shmctl$IPC_RMID(0x0, 0x0) 04:39:47 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) 04:39:47 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280), 0x4) 04:39:47 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) 04:39:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) sched_getaffinity(0x0, 0x8, &(0x7f00000000c0)) [ 533.954309] audit: type=1326 audit(1529728787.953:754): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=1148 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:39:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') 04:39:48 executing program 4: openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 04:39:48 executing program 1: ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x0) 04:39:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) 04:39:48 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) 04:39:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') 04:39:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) sched_getaffinity(0x0, 0x8, &(0x7f00000000c0)) 04:39:48 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280), 0x4) 04:39:48 executing program 4: openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 04:39:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) 04:39:48 executing program 1: ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x0) 04:39:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4080000000000006}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0) shmctl$IPC_RMID(0x0, 0x0) 04:39:48 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) 04:39:48 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280), 0x4) 04:39:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') 04:39:48 executing program 6: openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) sched_getaffinity(0x0, 0x8, &(0x7f00000000c0)) 04:39:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) 04:39:48 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 04:39:48 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x0) [ 534.882841] audit: type=1326 audit(1529728788.881:755): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=1207 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:39:48 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x8000502ae}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) 04:39:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') 04:39:49 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 04:39:49 executing program 6: openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) sched_getaffinity(0x0, 0x8, &(0x7f00000000c0)) 04:39:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280), 0x4) 04:39:49 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x0) 04:39:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) 04:39:49 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x8000502ae}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) [ 535.099380] audit: type=1326 audit(1529728789.097:756): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=1227 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:39:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4080000000000006}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0) shmctl$IPC_RMID(0x0, 0x0) 04:39:49 executing program 6: openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) sched_getaffinity(0x0, 0x8, &(0x7f00000000c0)) 04:39:49 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 04:39:49 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x0) 04:39:49 executing program 7: dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280), 0x4) 04:39:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) 04:39:49 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x8000502ae}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) 04:39:49 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x0) 04:39:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) [ 535.853387] audit: type=1326 audit(1529728789.851:757): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=1262 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:39:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') 04:39:50 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 04:39:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) 04:39:50 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) sched_getaffinity(0x0, 0x8, &(0x7f00000000c0)) 04:39:50 executing program 7: dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280), 0x4) [ 536.014490] audit: type=1326 audit(1529728790.013:758): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=1272 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:39:50 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x0) 04:39:50 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) sched_getaffinity(0x0, 0x8, &(0x7f00000000c0)) [ 536.165342] audit: type=1326 audit(1529728790.163:759): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=1293 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:39:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) 04:39:50 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 04:39:50 executing program 7: dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280), 0x4) 04:39:50 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x0) 04:39:50 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) sched_getaffinity(0x0, 0x8, &(0x7f00000000c0)) 04:39:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x7530}, 0x10) 04:39:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) 04:39:50 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022d}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x0) 04:39:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) 04:39:51 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') 04:39:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 04:39:51 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) sched_getaffinity(0x0, 0x8, &(0x7f00000000c0)) 04:39:51 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280), 0x4) 04:39:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x7530}, 0x10) 04:39:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x8000502ae}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) 04:39:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022d}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x0) [ 537.061810] audit: type=1326 audit(1529728791.060:760): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=1335 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:39:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022d}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x0) [ 537.187245] audit: type=1326 audit(1529728791.185:761): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=1350 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:39:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 04:39:51 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) sched_getaffinity(0x0, 0x8, &(0x7f00000000c0)) 04:39:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x8000502ae}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) 04:39:51 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280), 0x4) 04:39:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x7530}, 0x10) 04:39:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 04:39:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x0) [ 537.537837] audit: type=1326 audit(1529728791.536:762): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=1378 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:39:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) [ 537.959302] audit: type=1326 audit(1529728791.958:763): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=1384 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:39:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x7530}, 0x10) 04:39:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) sched_getaffinity(0x0, 0x8, &(0x7f00000000c0)) 04:39:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x8000502ae}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) 04:39:52 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280), 0x4) 04:39:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) pipe(&(0x7f0000000400)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'team_slave_0\x00'}) 04:39:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 04:39:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280), 0x4) 04:39:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 04:39:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) sched_getaffinity(0x0, 0x8, &(0x7f00000000c0)) 04:39:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) 04:39:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x7530}, 0x10) [ 538.251981] audit: type=1326 audit(1529728792.250:764): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=1403 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:39:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) pipe(&(0x7f0000000400)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'team_slave_0\x00'}) 04:39:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) sched_getaffinity(0x0, 0x8, &(0x7f00000000c0)) [ 538.338650] audit: type=1326 audit(1529728792.299:765): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=1408 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:39:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280), 0x4) 04:39:52 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x0) [ 538.573631] audit: type=1326 audit(1529728792.572:766): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=1429 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:39:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) pipe(&(0x7f0000000400)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'team_slave_0\x00'}) 04:39:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x7530}, 0x10) 04:39:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) sched_getaffinity(0x0, 0x8, &(0x7f00000000c0)) 04:39:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280), 0x4) 04:39:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000100)="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") 04:39:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) sched_getaffinity(0x0, 0x8, &(0x7f00000000c0)) 04:39:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280), 0x4) 04:39:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x7530}, 0x10) [ 539.047211] audit: type=1326 audit(1529728793.040:767): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=1448 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:39:53 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 04:39:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000100)="b3b080dc9ae1507bb0b1fdf2e529ef33a17c401083a7ce1e4818844cfc3ac27c77d91a6868b1b9a29669607b7b1e19d464fd7c6b7663a24b3f7eabde2089a6a61d09aacdfc5a5c60df55a597476e7be192a04dce07c9c01d37af8c906611b6976d432517d5e7f3022ddb1c70661c9064cbbd468b8f3037ef32158756471b1d8138aaf58ee554a72d0004ff75c8047b1885c5ba64efa879f3c57543f0418debfcf4723f7fbf998f0ac42bfb6a73f99d511137fde19c205c8ad66195aa7ecacf1f68164542bea3bf5534ef914b0243ce509620c41759a074fe8e49a309bc0d38fc337516e1a925b2cf4b6f40554c56eda8847f954c9353f57da6c040668d0b321c") 04:39:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) 04:39:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) pipe(&(0x7f0000000400)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'team_slave_0\x00'}) 04:39:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280), 0x4) 04:39:53 executing program 2: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x7530}, 0x10) [ 539.255799] audit: type=1326 audit(1529728793.253:768): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=1472 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:39:53 executing program 2: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x7530}, 0x10) 04:39:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x0) 04:39:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000100)="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") 04:39:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'team_slave_0\x00'}) 04:39:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280), 0x4) 04:39:53 executing program 2: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x7530}, 0x10) 04:39:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280), 0x4) 04:39:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000100)="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") 04:39:53 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x7530}, 0x10) 04:39:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) sched_getaffinity(0x0, 0x8, &(0x7f00000000c0)) 04:39:54 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 04:39:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'team_slave_0\x00'}) 04:39:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) 04:39:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'team_slave_0\x00'}) 04:39:54 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x7530}, 0x10) 04:39:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000100)="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") 04:39:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000100)="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") 04:39:54 executing program 0: pipe(&(0x7f0000000400)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'team_slave_0\x00'}) 04:39:54 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x7530}, 0x10) 04:39:54 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]}) pipe(&(0x7f0000000080)) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000000c0)=""/231) 04:39:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000100)="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") 04:39:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x7530}, 0x10) 04:39:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280), 0x4) 04:39:54 executing program 0: pipe(&(0x7f0000000400)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'team_slave_0\x00'}) 04:39:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) sched_getaffinity(0x0, 0x8, &(0x7f00000000c0)) 04:39:54 executing program 3: openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000100)="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") 04:39:55 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]}) pipe(&(0x7f0000000080)) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000000c0)=""/231) 04:39:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x7530}, 0x10) 04:39:55 executing program 0: pipe(&(0x7f0000000400)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'team_slave_0\x00'}) 04:39:55 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]}) pipe(&(0x7f0000000080)) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000000c0)=""/231) 04:39:55 executing program 3: openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000100)="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") 04:39:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x7530}, 0x10) 04:39:55 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) pipe(&(0x7f0000000400)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'team_slave_0\x00'}) 04:39:55 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000100)) 04:39:55 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) 04:39:55 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) pipe(&(0x7f0000000400)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'team_slave_0\x00'}) 04:39:55 executing program 3: openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000100)="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") 04:39:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x7530}, 0x10) 04:39:55 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280), 0x4) 04:39:55 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]}) pipe(&(0x7f0000000080)) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000000c0)=""/231) [ 541.641832] kauditd_printk_skb: 8 callbacks suppressed [ 541.641855] audit: type=1326 audit(1529728795.640:777): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=1623 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:39:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x7530}, 0x10) 04:39:55 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000100)) 04:39:55 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) 04:39:55 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) pipe(&(0x7f0000000400)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'team_slave_0\x00'}) 04:39:55 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000100)="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") 04:39:55 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) 04:39:55 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]}) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000000c0)=""/231) 04:39:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x7530}, 0x10) 04:39:55 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000100)="b3b080dc9ae1507bb0b1fdf2e529ef33a17c401083a7ce1e4818844cfc3ac27c77d91a6868b1b9a29669607b7b1e19d464fd7c6b7663a24b3f7eabde2089a6a61d09aacdfc5a5c60df55a597476e7be192a04dce07c9c01d37af8c906611b6976d432517d5e7f3022ddb1c70661c9064cbbd468b8f3037ef32158756471b1d8138aaf58ee554a72d0004ff75c8047b1885c5ba64efa879f3c57543f0418debfcf4723f7fbf998f0ac42bfb6a73f99d511137fde19c205c8ad66195aa7ecacf1f68164542bea3bf5534ef914b0243ce509620c41759a074fe8e49a309bc0d38fc337516e1a925b2cf4b6f40554c56eda8847f954c9353f57da6c040668d0b321c") 04:39:55 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) pipe(&(0x7f0000000400)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'team_slave_0\x00'}) 04:39:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]}) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000000c0)=""/231) 04:39:56 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) 04:39:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000100)) 04:39:56 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) 04:39:56 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x7530}, 0x10) 04:39:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]}) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000000c0)=""/231) 04:39:56 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000100)="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") 04:39:56 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) pipe(&(0x7f0000000400)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'team_slave_0\x00'}) 04:39:56 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) 04:39:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000100)) 04:39:56 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) 04:39:56 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) ustat(0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000140)) [ 542.601879] audit: type=1326 audit(1529728796.600:778): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=1676 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:39:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000100)="b3b080dc9ae1507bb0b1fdf2e529ef33a17c401083a7ce1e4818844cfc3ac27c77d91a6868b1b9a29669607b7b1e19d464fd7c6b7663a24b3f7eabde2089a6a61d09aacdfc5a5c60df55a597476e7be192a04dce07c9c01d37af8c906611b6976d432517d5e7f3022ddb1c70661c9064cbbd468b8f3037ef32158756471b1d8138aaf58ee554a72d0004ff75c8047b1885c5ba64efa879f3c57543f0418debfcf4723f7fbf998f0ac42bfb6a73f99d511137fde19c205c8ad66195aa7ecacf1f68164542bea3bf5534ef914b0243ce509620c41759a074fe8e49a309bc0d38fc337516e1a925b2cf4b6f40554c56eda8847f954c9353f57da6c040668d0b321c") 04:39:56 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) pipe(&(0x7f0000000400)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'team_slave_0\x00'}) 04:39:56 executing program 1: pipe(&(0x7f0000000080)) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000000c0)=""/231) 04:39:56 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) 04:39:56 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) 04:39:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000100)) 04:39:56 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) ustat(0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000140)) 04:39:56 executing program 1: pipe(&(0x7f0000000080)) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000000c0)=""/231) 04:39:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x7530}, 0x10) 04:39:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000100)="b3b080dc9ae1507bb0b1fdf2e529ef33a17c401083a7ce1e4818844cfc3ac27c77d91a6868b1b9a29669607b7b1e19d464fd7c6b7663a24b3f7eabde2089a6a61d09aacdfc5a5c60df55a597476e7be192a04dce07c9c01d37af8c906611b6976d432517d5e7f3022ddb1c70661c9064cbbd468b8f3037ef32158756471b1d8138aaf58ee554a72d0004ff75c8047b1885c5ba64efa879f3c57543f0418debfcf4723f7fbf998f0ac42bfb6a73f99d511137fde19c205c8ad66195aa7ecacf1f68164542bea3bf5534ef914b0243ce509620c41759a074fe8e49a309bc0d38fc337516e1a925b2cf4b6f40554c56eda8847f954c9353f57da6c040668d0b321c") 04:39:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) pipe(&(0x7f0000000400)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'team_slave_0\x00'}) 04:39:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) 04:39:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000100)) 04:39:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) 04:39:57 executing program 1: pipe(&(0x7f0000000080)) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000000c0)=""/231) 04:39:57 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) ustat(0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000140)) 04:39:57 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]}) pipe(&(0x7f0000000080)) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000000c0)=""/231) [ 543.578845] audit: type=1326 audit(1529728797.577:779): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=1740 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:39:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) pipe(&(0x7f0000000400)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'team_slave_0\x00'}) 04:39:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) 04:39:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000100)="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") 04:39:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) 04:39:57 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) ustat(0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000140)) 04:39:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000100)) 04:39:57 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]}) pipe(&(0x7f0000000080)) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000000c0)=""/231) 04:39:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x7530}, 0x10) 04:39:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) 04:39:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) pipe(&(0x7f0000000400)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'team_slave_0\x00'}) 04:39:58 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) 04:39:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000100)="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") 04:39:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000140)) 04:39:58 executing program 4: accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000100)) 04:39:58 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]}) pipe(&(0x7f0000000080)) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000000c0)=""/231) [ 544.554562] audit: type=1326 audit(1529728798.553:780): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=1793 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:39:58 executing program 4: accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000100)) 04:39:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) pipe(&(0x7f0000000400)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'team_slave_0\x00'}) 04:39:58 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) 04:39:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000100)="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") 04:39:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) pipe(&(0x7f0000000080)) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000000c0)=""/231) 04:39:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000140)) 04:39:58 executing program 6: accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) [ 544.740563] audit: type=1326 audit(1529728798.739:781): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=1799 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:39:58 executing program 4: accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000100)) 04:39:59 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000100)) 04:39:59 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) 04:39:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000100)="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") 04:39:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) pipe(&(0x7f0000000080)) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000000c0)=""/231) 04:39:59 executing program 6: accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) 04:39:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000140)) 04:39:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) signalfd(0xffffffffffffff9c, &(0x7f0000000080), 0x8) finit_module(0xffffffffffffffff, &(0x7f0000000140)="2f6465762f75696e70757400b442b1b7b930bdd7bcc25258a2a3ffb1ca57f90b0e6a03021c2489e08c8a951b2af3203e7d30241a389be58ce9f643c35f39505d53aad1b6a12128de4095e121fbfee734ceeb2501ba6cd697727da67dbbc9a9cd877ae7e05736a97f0275d42ddce2437061c6c08ac5ad634c9349c2339e98b03abb82e928000000", 0x0) 04:39:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) pipe(&(0x7f0000000080)) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000000c0)=""/231) 04:39:59 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) 04:39:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) pipe(&(0x7f0000000400)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'team_slave_0\x00'}) 04:39:59 executing program 6: accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) 04:39:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000100)="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") 04:39:59 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000100)) 04:39:59 executing program 7: ustat(0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000140)) 04:39:59 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) [ 545.771178] audit: type=1326 audit(1529728799.769:782): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=1859 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:39:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) signalfd(0xffffffffffffff9c, &(0x7f0000000080), 0x8) finit_module(0xffffffffffffffff, &(0x7f0000000140)="2f6465762f75696e70757400b442b1b7b930bdd7bcc25258a2a3ffb1ca57f90b0e6a03021c2489e08c8a951b2af3203e7d30241a389be58ce9f643c35f39505d53aad1b6a12128de4095e121fbfee734ceeb2501ba6cd697727da67dbbc9a9cd877ae7e05736a97f0275d42ddce2437061c6c08ac5ad634c9349c2339e98b03abb82e928000000", 0x0) 04:39:59 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000100)) 04:39:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x5000c}]}) pipe(&(0x7f0000000080)) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000000c0)=""/231) [ 545.848162] audit: type=1326 audit(1529728799.807:783): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=1862 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:39:59 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) 04:39:59 executing program 7: ustat(0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000140)) 04:39:59 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) 04:40:00 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000100)) 04:40:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) signalfd(0xffffffffffffff9c, &(0x7f0000000080), 0x8) finit_module(0xffffffffffffffff, &(0x7f0000000140)="2f6465762f75696e70757400b442b1b7b930bdd7bcc25258a2a3ffb1ca57f90b0e6a03021c2489e08c8a951b2af3203e7d30241a389be58ce9f643c35f39505d53aad1b6a12128de4095e121fbfee734ceeb2501ba6cd697727da67dbbc9a9cd877ae7e05736a97f0275d42ddce2437061c6c08ac5ad634c9349c2339e98b03abb82e928000000", 0x0) 04:40:00 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x5000c}]}) pipe(&(0x7f0000000080)) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000000c0)=""/231) 04:40:00 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) 04:40:00 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) pipe(&(0x7f0000000400)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'team_slave_0\x00'}) 04:40:00 executing program 7: ustat(0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000140)) 04:40:00 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) 04:40:00 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000100)) 04:40:00 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x5000c}]}) pipe(&(0x7f0000000080)) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000000c0)=""/231) 04:40:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) signalfd(0xffffffffffffff9c, &(0x7f0000000080), 0x8) finit_module(0xffffffffffffffff, &(0x7f0000000140)="2f6465762f75696e70757400b442b1b7b930bdd7bcc25258a2a3ffb1ca57f90b0e6a03021c2489e08c8a951b2af3203e7d30241a389be58ce9f643c35f39505d53aad1b6a12128de4095e121fbfee734ceeb2501ba6cd697727da67dbbc9a9cd877ae7e05736a97f0275d42ddce2437061c6c08ac5ad634c9349c2339e98b03abb82e928000000", 0x0) 04:40:00 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) 04:40:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000100)="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") [ 546.759922] audit: type=1326 audit(1529728800.758:784): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=1920 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:00 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) pipe(&(0x7f0000000080)) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000000c0)=""/231) 04:40:00 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) [ 546.822236] audit: type=1326 audit(1529728800.805:785): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=1924 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:00 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) ustat(0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000140)) 04:40:00 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) 04:40:00 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000100)) [ 546.965660] audit: type=1326 audit(1529728800.914:786): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=1931 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:01 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) ustat(0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000140)) 04:40:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) finit_module(0xffffffffffffffff, &(0x7f0000000140)="2f6465762f75696e70757400b442b1b7b930bdd7bcc25258a2a3ffb1ca57f90b0e6a03021c2489e08c8a951b2af3203e7d30241a389be58ce9f643c35f39505d53aad1b6a12128de4095e121fbfee734ceeb2501ba6cd697727da67dbbc9a9cd877ae7e05736a97f0275d42ddce2437061c6c08ac5ad634c9349c2339e98b03abb82e928000000", 0x0) 04:40:01 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) 04:40:01 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) 04:40:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) 04:40:01 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000100)) 04:40:01 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50192}]}) syz_open_dev$mice(&(0x7f00000002c0)='/dev/input/mice\x00', 0x0, 0x0) lchown(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 04:40:01 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) ustat(0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000140)) 04:40:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000100)="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") 04:40:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) finit_module(0xffffffffffffffff, &(0x7f0000000140)="2f6465762f75696e70757400b442b1b7b930bdd7bcc25258a2a3ffb1ca57f90b0e6a03021c2489e08c8a951b2af3203e7d30241a389be58ce9f643c35f39505d53aad1b6a12128de4095e121fbfee734ceeb2501ba6cd697727da67dbbc9a9cd877ae7e05736a97f0275d42ddce2437061c6c08ac5ad634c9349c2339e98b03abb82e928000000", 0x0) [ 547.761560] audit: type=1326 audit(1529728801.760:787): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=1973 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:01 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000100)) 04:40:01 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) pipe(&(0x7f0000000080)) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000000c0)=""/231) 04:40:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) 04:40:01 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) 04:40:01 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000300)}) ustat(0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000140)) 04:40:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) finit_module(0xffffffffffffffff, &(0x7f0000000140)="2f6465762f75696e70757400b442b1b7b930bdd7bcc25258a2a3ffb1ca57f90b0e6a03021c2489e08c8a951b2af3203e7d30241a389be58ce9f643c35f39505d53aad1b6a12128de4095e121fbfee734ceeb2501ba6cd697727da67dbbc9a9cd877ae7e05736a97f0275d42ddce2437061c6c08ac5ad634c9349c2339e98b03abb82e928000000", 0x0) 04:40:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000100)) [ 547.993428] audit: type=1326 audit(1529728801.992:788): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=1993 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xfffffffffffffde6) getpeername(0xffffffffffffffff, &(0x7f0000000b80)=@can, &(0x7f0000000c00)=0x80) 04:40:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) 04:40:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) 04:40:02 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000300)}) ustat(0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000140)) 04:40:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) 04:40:02 executing program 2: signalfd(0xffffffffffffff9c, &(0x7f0000000080), 0x8) finit_module(0xffffffffffffffff, &(0x7f0000000140)="2f6465762f75696e70757400b442b1b7b930bdd7bcc25258a2a3ffb1ca57f90b0e6a03021c2489e08c8a951b2af3203e7d30241a389be58ce9f643c35f39505d53aad1b6a12128de4095e121fbfee734ceeb2501ba6cd697727da67dbbc9a9cd877ae7e05736a97f0275d42ddce2437061c6c08ac5ad634c9349c2339e98b03abb82e928000000", 0x0) 04:40:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000100)) [ 548.357761] audit: type=1326 audit(1529728802.356:789): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2024 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:02 executing program 2: signalfd(0xffffffffffffff9c, &(0x7f0000000080), 0x8) finit_module(0xffffffffffffffff, &(0x7f0000000140)="2f6465762f75696e70757400b442b1b7b930bdd7bcc25258a2a3ffb1ca57f90b0e6a03021c2489e08c8a951b2af3203e7d30241a389be58ce9f643c35f39505d53aad1b6a12128de4095e121fbfee734ceeb2501ba6cd697727da67dbbc9a9cd877ae7e05736a97f0275d42ddce2437061c6c08ac5ad634c9349c2339e98b03abb82e928000000", 0x0) 04:40:02 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000300)}) ustat(0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000140)) 04:40:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) 04:40:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) pipe(&(0x7f0000000080)) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000000c0)=""/231) 04:40:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) 04:40:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xfffffffffffffde6) getpeername(0xffffffffffffffff, &(0x7f0000000b80)=@can, &(0x7f0000000c00)=0x80) 04:40:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) accept(0xffffffffffffffff, &(0x7f00000000c0)=@ipx, &(0x7f0000000000)=0x80) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000007740)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000007700)={&(0x7f0000007500)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 04:40:02 executing program 2: signalfd(0xffffffffffffff9c, &(0x7f0000000080), 0x8) finit_module(0xffffffffffffffff, &(0x7f0000000140)="2f6465762f75696e70757400b442b1b7b930bdd7bcc25258a2a3ffb1ca57f90b0e6a03021c2489e08c8a951b2af3203e7d30241a389be58ce9f643c35f39505d53aad1b6a12128de4095e121fbfee734ceeb2501ba6cd697727da67dbbc9a9cd877ae7e05736a97f0275d42ddce2437061c6c08ac5ad634c9349c2339e98b03abb82e928000000", 0x0) 04:40:02 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x50355}]}) ustat(0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000140)) 04:40:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) [ 548.909279] audit: type=1326 audit(1529728802.907:790): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2048 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:03 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) signalfd(0xffffffffffffff9c, &(0x7f0000000080), 0x8) finit_module(0xffffffffffffffff, &(0x7f0000000140)="2f6465762f75696e70757400b442b1b7b930bdd7bcc25258a2a3ffb1ca57f90b0e6a03021c2489e08c8a951b2af3203e7d30241a389be58ce9f643c35f39505d53aad1b6a12128de4095e121fbfee734ceeb2501ba6cd697727da67dbbc9a9cd877ae7e05736a97f0275d42ddce2437061c6c08ac5ad634c9349c2339e98b03abb82e928000000", 0x0) 04:40:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x50355}]}) ustat(0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000140)) [ 548.980302] audit: type=1326 audit(1529728802.972:791): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2058 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 549.000214] audit: type=1326 audit(1529728802.977:792): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2045 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xfffffffffffffde6) getpeername(0xffffffffffffffff, &(0x7f0000000b80)=@can, &(0x7f0000000c00)=0x80) 04:40:03 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) accept(0xffffffffffffffff, &(0x7f00000000c0)=@ipx, &(0x7f0000000000)=0x80) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000007740)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000007700)={&(0x7f0000007500)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 04:40:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x50355}]}) ustat(0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000140)) 04:40:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000100)) 04:40:03 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) signalfd(0xffffffffffffff9c, &(0x7f0000000080), 0x8) finit_module(0xffffffffffffffff, &(0x7f0000000140)="2f6465762f75696e70757400b442b1b7b930bdd7bcc25258a2a3ffb1ca57f90b0e6a03021c2489e08c8a951b2af3203e7d30241a389be58ce9f643c35f39505d53aad1b6a12128de4095e121fbfee734ceeb2501ba6cd697727da67dbbc9a9cd877ae7e05736a97f0275d42ddce2437061c6c08ac5ad634c9349c2339e98b03abb82e928000000", 0x0) 04:40:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000580)={{{@in=@loopback}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8) 04:40:03 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) accept(0xffffffffffffffff, &(0x7f00000000c0)=@ipx, &(0x7f0000000000)=0x80) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000007740)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000007700)={&(0x7f0000007500)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) [ 549.364650] audit: type=1326 audit(1529728803.363:793): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2084 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) 04:40:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000580)={{{@in=@loopback}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8) 04:40:03 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) accept(0xffffffffffffffff, &(0x7f00000000c0)=@ipx, &(0x7f0000000000)=0x80) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000007740)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000007700)={&(0x7f0000007500)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 04:40:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6}]}) ustat(0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000140)) 04:40:03 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) signalfd(0xffffffffffffff9c, &(0x7f0000000080), 0x8) finit_module(0xffffffffffffffff, &(0x7f0000000140)="2f6465762f75696e70757400b442b1b7b930bdd7bcc25258a2a3ffb1ca57f90b0e6a03021c2489e08c8a951b2af3203e7d30241a389be58ce9f643c35f39505d53aad1b6a12128de4095e121fbfee734ceeb2501ba6cd697727da67dbbc9a9cd877ae7e05736a97f0275d42ddce2437061c6c08ac5ad634c9349c2339e98b03abb82e928000000", 0x0) 04:40:03 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) 04:40:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000200)) 04:40:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) signalfd(0xffffffffffffff9c, &(0x7f0000000080), 0x8) finit_module(0xffffffffffffffff, &(0x7f0000000140)="2f6465762f75696e70757400b442b1b7b930bdd7bcc25258a2a3ffb1ca57f90b0e6a03021c2489e08c8a951b2af3203e7d30241a389be58ce9f643c35f39505d53aad1b6a12128de4095e121fbfee734ceeb2501ba6cd697727da67dbbc9a9cd877ae7e05736a97f0275d42ddce2437061c6c08ac5ad634c9349c2339e98b03abb82e928000000", 0x0) 04:40:03 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000007740)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000007700)={&(0x7f0000007500)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 04:40:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000580)={{{@in=@loopback}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8) 04:40:04 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) signalfd(0xffffffffffffff9c, &(0x7f0000000080), 0x8) finit_module(0xffffffffffffffff, &(0x7f0000000140)="2f6465762f75696e70757400b442b1b7b930bdd7bcc25258a2a3ffb1ca57f90b0e6a03021c2489e08c8a951b2af3203e7d30241a389be58ce9f643c35f39505d53aad1b6a12128de4095e121fbfee734ceeb2501ba6cd697727da67dbbc9a9cd877ae7e05736a97f0275d42ddce2437061c6c08ac5ad634c9349c2339e98b03abb82e928000000", 0x0) 04:40:04 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000200)) 04:40:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000100)) 04:40:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000007740)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000007700)={&(0x7f0000007500)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 04:40:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000580)={{{@in=@loopback}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8) 04:40:04 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) signalfd(0xffffffffffffff9c, &(0x7f0000000080), 0x8) finit_module(0xffffffffffffffff, &(0x7f0000000140)="2f6465762f75696e70757400b442b1b7b930bdd7bcc25258a2a3ffb1ca57f90b0e6a03021c2489e08c8a951b2af3203e7d30241a389be58ce9f643c35f39505d53aad1b6a12128de4095e121fbfee734ceeb2501ba6cd697727da67dbbc9a9cd877ae7e05736a97f0275d42ddce2437061c6c08ac5ad634c9349c2339e98b03abb82e928000000", 0x0) 04:40:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6}]}) ustat(0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000140)) 04:40:05 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) 04:40:05 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000200)) 04:40:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) signalfd(0xffffffffffffff9c, &(0x7f0000000080), 0x8) finit_module(0xffffffffffffffff, &(0x7f0000000140)="2f6465762f75696e70757400b442b1b7b930bdd7bcc25258a2a3ffb1ca57f90b0e6a03021c2489e08c8a951b2af3203e7d30241a389be58ce9f643c35f39505d53aad1b6a12128de4095e121fbfee734ceeb2501ba6cd697727da67dbbc9a9cd877ae7e05736a97f0275d42ddce2437061c6c08ac5ad634c9349c2339e98b03abb82e928000000", 0x0) 04:40:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000007740)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000007700)={&(0x7f0000007500)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 04:40:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) 04:40:05 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000580)={{{@in=@loopback}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8) 04:40:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) signalfd(0xffffffffffffff9c, &(0x7f0000000080), 0x8) finit_module(0xffffffffffffffff, &(0x7f0000000140)="2f6465762f75696e70757400b442b1b7b930bdd7bcc25258a2a3ffb1ca57f90b0e6a03021c2489e08c8a951b2af3203e7d30241a389be58ce9f643c35f39505d53aad1b6a12128de4095e121fbfee734ceeb2501ba6cd697727da67dbbc9a9cd877ae7e05736a97f0275d42ddce2437061c6c08ac5ad634c9349c2339e98b03abb82e928000000", 0x0) 04:40:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f00000001c0)=""/62, 0x3e}, 0x0) 04:40:05 executing program 3: accept(0xffffffffffffffff, &(0x7f00000000c0)=@ipx, &(0x7f0000000000)=0x80) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000007740)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000007700)={&(0x7f0000007500)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 04:40:05 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000200)) 04:40:05 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000580)={{{@in=@loopback}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8) 04:40:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) signalfd(0xffffffffffffff9c, &(0x7f0000000080), 0x8) finit_module(0xffffffffffffffff, &(0x7f0000000140)="2f6465762f75696e70757400b442b1b7b930bdd7bcc25258a2a3ffb1ca57f90b0e6a03021c2489e08c8a951b2af3203e7d30241a389be58ce9f643c35f39505d53aad1b6a12128de4095e121fbfee734ceeb2501ba6cd697727da67dbbc9a9cd877ae7e05736a97f0275d42ddce2437061c6c08ac5ad634c9349c2339e98b03abb82e928000000", 0x0) 04:40:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f00000001c0)=""/62, 0x3e}, 0x0) 04:40:05 executing program 3: accept(0xffffffffffffffff, &(0x7f00000000c0)=@ipx, &(0x7f0000000000)=0x80) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000007740)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000007700)={&(0x7f0000007500)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 04:40:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) signalfd(0xffffffffffffff9c, &(0x7f0000000080), 0x8) finit_module(0xffffffffffffffff, &(0x7f0000000140)="2f6465762f75696e70757400b442b1b7b930bdd7bcc25258a2a3ffb1ca57f90b0e6a03021c2489e08c8a951b2af3203e7d30241a389be58ce9f643c35f39505d53aad1b6a12128de4095e121fbfee734ceeb2501ba6cd697727da67dbbc9a9cd877ae7e05736a97f0275d42ddce2437061c6c08ac5ad634c9349c2339e98b03abb82e928000000", 0x0) [ 551.827958] kauditd_printk_skb: 7 callbacks suppressed [ 551.827978] audit: type=1326 audit(1529728805.826:801): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2206 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:05 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6}]}) ustat(0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000140)) 04:40:05 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000200)) 04:40:05 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000580)={{{@in=@loopback}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8) 04:40:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f00000001c0)=""/62, 0x3e}, 0x0) 04:40:05 executing program 3: accept(0xffffffffffffffff, &(0x7f00000000c0)=@ipx, &(0x7f0000000000)=0x80) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000007740)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000007700)={&(0x7f0000007500)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 04:40:05 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) request_key(&(0x7f0000000140)='blacklist\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000200)='*:\x00', 0xfffffffffffffffc) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 552.054537] audit: type=1326 audit(1529728806.053:802): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2215 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:06 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000100)=""/185) 04:40:06 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000580)={{{@in=@loopback}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8) 04:40:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000200)) 04:40:06 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) accept(0xffffffffffffffff, &(0x7f00000000c0)=@ipx, &(0x7f0000000000)=0x80) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000007740)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000007700)={&(0x7f0000007500)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 04:40:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000040), 0x10) 04:40:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f00000001c0)=""/62, 0x3e}, 0x0) 04:40:06 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000580)={{{@in=@loopback}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8) 04:40:06 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) accept(0xffffffffffffffff, &(0x7f00000000c0)=@ipx, &(0x7f0000000000)=0x80) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000007740)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000007700)={&(0x7f0000007500)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 04:40:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000200)) 04:40:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) signalfd(0xffffffffffffff9c, &(0x7f0000000080), 0x8) finit_module(0xffffffffffffffff, &(0x7f0000000140)="2f6465762f75696e70757400b442b1b7b930bdd7bcc25258a2a3ffb1ca57f90b0e6a03021c2489e08c8a951b2af3203e7d30241a389be58ce9f643c35f39505d53aad1b6a12128de4095e121fbfee734ceeb2501ba6cd697727da67dbbc9a9cd877ae7e05736a97f0275d42ddce2437061c6c08ac5ad634c9349c2339e98b03abb82e928000000", 0x0) [ 552.769842] audit: type=1326 audit(1529728806.768:803): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2263 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:06 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000200)) 04:40:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) prlimit64(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080)) 04:40:06 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000100)=""/185) 04:40:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50355}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000140)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) 04:40:06 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) accept(0xffffffffffffffff, &(0x7f00000000c0)=@ipx, &(0x7f0000000000)=0x80) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000007740)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000007700)={&(0x7f0000007500)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 04:40:06 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000580)={{{@in=@loopback}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8) 04:40:07 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000580)={{{@in=@loopback}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8) 04:40:07 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) accept(0xffffffffffffffff, &(0x7f00000000c0)=@ipx, &(0x7f0000000000)=0x80) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000007740)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000007700)={&(0x7f0000007500)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 04:40:07 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000200)) 04:40:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000100)=""/185) 04:40:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) prlimit64(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080)) 04:40:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000040)) 04:40:07 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000200)) 04:40:07 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000580)={{{@in=@loopback}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8) 04:40:07 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) accept(0xffffffffffffffff, &(0x7f00000000c0)=@ipx, &(0x7f0000000000)=0x80) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000007740)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000007700)={&(0x7f0000007500)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 04:40:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) signalfd(0xffffffffffffff9c, &(0x7f0000000080), 0x8) finit_module(0xffffffffffffffff, &(0x7f0000000140)="2f6465762f75696e70757400b442b1b7b930bdd7bcc25258a2a3ffb1ca57f90b0e6a03021c2489e08c8a951b2af3203e7d30241a389be58ce9f643c35f39505d53aad1b6a12128de4095e121fbfee734ceeb2501ba6cd697727da67dbbc9a9cd877ae7e05736a97f0275d42ddce2437061c6c08ac5ad634c9349c2339e98b03abb82e928000000", 0x0) 04:40:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) prlimit64(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080)) 04:40:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000040)) 04:40:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000100)=""/185) 04:40:07 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000580)={{{@in=@loopback}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8) 04:40:07 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000200)) 04:40:07 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) accept(0xffffffffffffffff, &(0x7f00000000c0)=@ipx, &(0x7f0000000000)=0x80) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000007740)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000007700)={&(0x7f0000007500)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 04:40:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000580)={{{@in=@loopback}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8) [ 553.753964] audit: type=1326 audit(1529728807.752:804): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2329 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:07 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000200)) 04:40:07 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) accept(0xffffffffffffffff, &(0x7f00000000c0)=@ipx, &(0x7f0000000000)=0x80) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000007740)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000007700)={&(0x7f0000007500)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 04:40:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) prlimit64(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080)) 04:40:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000100)=""/185) 04:40:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000040)) 04:40:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000580)={{{@in=@loopback}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8) 04:40:08 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000200)) 04:40:08 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) accept(0xffffffffffffffff, &(0x7f00000000c0)=@ipx, &(0x7f0000000000)=0x80) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000007740)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000007700)={&(0x7f0000007500)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 04:40:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000100)=""/185) 04:40:08 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000580)={{{@in=@loopback}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8) 04:40:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) prlimit64(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080)) 04:40:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000040)) 04:40:08 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) accept(0xffffffffffffffff, &(0x7f00000000c0)=@ipx, &(0x7f0000000000)=0x80) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000007740)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000007700)={&(0x7f0000007500)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 04:40:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000200)) 04:40:08 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000580)={{{@in=@loopback}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8) 04:40:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000200)) 04:40:08 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) accept(0xffffffffffffffff, &(0x7f00000000c0)=@ipx, &(0x7f0000000000)=0x80) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000007740)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000007700)={&(0x7f0000007500)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 04:40:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000100)=""/185) 04:40:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000040)) 04:40:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) prlimit64(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080)) [ 554.855105] audit: type=1326 audit(1529728808.853:805): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2383 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000200)) 04:40:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000580)={{{@in=@loopback}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8) 04:40:09 executing program 6: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000100)=""/185) 04:40:09 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000001200)=@in={0x0, 0x0, @rand_addr}, &(0x7f0000001280)=0x80) 04:40:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4080000000000006, 0x0, 0x0, 0x800050209}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000)) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4) 04:40:09 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000040)) 04:40:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000200)) 04:40:09 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) prlimit64(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080)) 04:40:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000580)={{{@in=@loopback}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8) 04:40:09 executing program 6: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000100)=""/185) 04:40:09 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000040)) 04:40:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4080000000000006, 0x0, 0x0, 0x800050209}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000)) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4) 04:40:09 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) accept(0xffffffffffffffff, &(0x7f00000000c0)=@ipx, &(0x7f0000000000)=0x80) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000007740)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000007700)={&(0x7f0000007500)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 04:40:09 executing program 4: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) prlimit64(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080)) 04:40:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000200)) 04:40:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000580)={{{@in=@loopback}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8) 04:40:09 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000001200)=@in={0x0, 0x0, @rand_addr}, &(0x7f0000001280)=0x80) 04:40:09 executing program 6: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000100)=""/185) 04:40:09 executing program 5: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000040)) 04:40:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4080000000000006, 0x0, 0x0, 0x800050209}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000)) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4) [ 555.773352] audit: type=1326 audit(1529728809.771:806): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2440 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:09 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000100)=""/185) 04:40:09 executing program 4: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) prlimit64(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080)) [ 555.865317] audit: type=1326 audit(1529728809.823:807): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2444 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:09 executing program 5: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000040)) 04:40:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000200)) 04:40:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4080000000000006, 0x0, 0x0, 0x800050209}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000)) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4) 04:40:10 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000001200)=@in={0x0, 0x0, @rand_addr}, &(0x7f0000001280)=0x80) 04:40:10 executing program 4: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) prlimit64(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080)) 04:40:10 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000100)=""/185) 04:40:10 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) accept(0xffffffffffffffff, &(0x7f00000000c0)=@ipx, &(0x7f0000000000)=0x80) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000007740)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000007700)={&(0x7f0000007500)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 04:40:10 executing program 5: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000040)) 04:40:10 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000200)) 04:40:10 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000580)={{{@in=@loopback}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8) 04:40:10 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000001200)=@in={0x0, 0x0, @rand_addr}, &(0x7f0000001280)=0x80) 04:40:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4080000000000006, 0x0, 0x0, 0x800050209}]}) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4) 04:40:10 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) prlimit64(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080)) 04:40:10 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000100)=""/185) [ 556.701503] audit: type=1326 audit(1529728810.700:808): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2489 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 556.730389] audit: type=1326 audit(1529728810.728:809): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2493 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:10 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000040)) [ 556.817384] audit: type=1326 audit(1529728810.816:810): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2503 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:10 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000100)=""/185) 04:40:10 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) getsockname(0xffffffffffffffff, &(0x7f0000001200)=@in={0x0, 0x0, @rand_addr}, &(0x7f0000001280)=0x80) 04:40:10 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) prlimit64(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080)) 04:40:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4080000000000006, 0x0, 0x0, 0x800050209}]}) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4) 04:40:11 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000040)) 04:40:11 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) prlimit64(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080)) 04:40:11 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) getsockname(0xffffffffffffffff, &(0x7f0000001200)=@in={0x0, 0x0, @rand_addr}, &(0x7f0000001280)=0x80) 04:40:11 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000040)) 04:40:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000100)=""/185) 04:40:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000200)) 04:40:11 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000580)={{{@in=@loopback}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8) 04:40:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4080000000000006, 0x0, 0x0, 0x800050209}]}) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4) 04:40:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) prlimit64(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080)) 04:40:11 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) getsockname(0xffffffffffffffff, &(0x7f0000001200)=@in={0x0, 0x0, @rand_addr}, &(0x7f0000001280)=0x80) 04:40:11 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) fcntl$getown(0xffffffffffffff9c, 0x9) chown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 04:40:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000100)=""/185) 04:40:11 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000040)) [ 557.715443] audit: type=1326 audit(1529728811.714:811): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2546 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000100)=""/185) [ 557.814119] audit: type=1326 audit(1529728811.812:812): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2551 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:11 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000040)) 04:40:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) prlimit64(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080)) 04:40:11 executing program 7: socket$inet6(0xa, 0x0, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000001200)=@in={0x0, 0x0, @rand_addr}, &(0x7f0000001280)=0x80) 04:40:11 executing program 2: socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000)) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4) 04:40:12 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) fcntl$getown(0xffffffffffffff9c, 0x9) chown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 04:40:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000040)) 04:40:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000100)=""/185) 04:40:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000200)) 04:40:12 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) fcntl$getown(0xffffffffffffff9c, 0x9) chown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 04:40:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) prlimit64(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080)) 04:40:12 executing program 2: socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000)) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4) [ 558.636200] audit: type=1326 audit(1529728812.634:813): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2598 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000100)=""/185) 04:40:12 executing program 7: socket$inet6(0xa, 0x0, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000001200)=@in={0x0, 0x0, @rand_addr}, &(0x7f0000001280)=0x80) 04:40:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x5023f}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000080)=""/36) 04:40:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000040)) 04:40:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000040)) 04:40:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) prlimit64(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080)) 04:40:12 executing program 2: socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000)) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4) 04:40:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000100)=""/185) 04:40:12 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) fcntl$getown(0xffffffffffffff9c, 0x9) chown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 04:40:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x5023f}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000080)=""/36) [ 558.963327] audit: type=1326 audit(1529728812.961:814): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2626 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:13 executing program 7: socket$inet6(0xa, 0x0, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000001200)=@in={0x0, 0x0, @rand_addr}, &(0x7f0000001280)=0x80) 04:40:13 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000040)) 04:40:13 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000001200)=@in={0x0, 0x0, @rand_addr}, &(0x7f0000001280)=0x80) 04:40:13 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) prlimit64(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080)) 04:40:13 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4080000000000006, 0x0, 0x0, 0x800050209}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000)) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4) 04:40:13 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) chown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 04:40:13 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000040)) 04:40:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x5023f}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000080)=""/36) 04:40:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018b}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)="4018726f632f7079732f6e65742f697076342f76732f63616368655f627970617373002db83bf6bbf88f19a61123d9812450c853852e25b550d6d5b526876eb383d6b2cdbb3afe303abaf8b48358f5920a091e010fcaeb30b104f8d01647e88ffd9fa0d085a9aecd3880f525232c495cb9d8a4f859d0d439e9bda89a82ca1eaf58f3cb4d68578d4eb623c72eb7aff4d10e3b6890c6066313517c2ff503567f455d8fe9c952739d9dc34fc8adc3e27f78d28b91be68e2a9ad91b5f8744823e7e83a9a4861b755", 0x2, 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f0000000080)) [ 559.593976] audit: type=1326 audit(1529728813.592:815): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2656 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:13 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4080000000000006, 0x0, 0x0, 0x800050209}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000)) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4) 04:40:13 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) prlimit64(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080)) 04:40:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x5023f}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000080)=""/36) 04:40:13 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000001200)=@in={0x0, 0x0, @rand_addr}, &(0x7f0000001280)=0x80) 04:40:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000100)=""/185) 04:40:13 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) chown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 04:40:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50350}]}) pipe(&(0x7f0000000000)) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) 04:40:13 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4080000000000006, 0x0, 0x0, 0x800050209}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000)) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4) 04:40:13 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) prlimit64(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080)) [ 559.982144] audit: type=1326 audit(1529728813.980:816): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2694 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x5023f}]}) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000080)=""/36) 04:40:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000)) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4) 04:40:14 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000001200)=@in={0x0, 0x0, @rand_addr}, &(0x7f0000001280)=0x80) [ 560.065956] audit: type=1326 audit(1529728814.028:817): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2696 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:14 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) chown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 04:40:14 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000040)) 04:40:14 executing program 3: fcntl$getown(0xffffffffffffff9c, 0x9) chown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 04:40:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50350}]}) pipe(&(0x7f0000000000)) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) 04:40:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000)) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4) 04:40:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x5023f}]}) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000080)=""/36) 04:40:14 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) socket$inet6(0xa, 0x0, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000001200)=@in={0x0, 0x0, @rand_addr}, &(0x7f0000001280)=0x80) 04:40:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000)) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4) [ 560.580523] audit: type=1326 audit(1529728814.579:818): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2733 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:14 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000100)=""/185) 04:40:14 executing program 3: fcntl$getown(0xffffffffffffff9c, 0x9) chown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 04:40:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x5023f}]}) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000080)=""/36) 04:40:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50350}]}) pipe(&(0x7f0000000000)) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) 04:40:14 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) socket$inet6(0xa, 0x0, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000001200)=@in={0x0, 0x0, @rand_addr}, &(0x7f0000001280)=0x80) 04:40:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000)) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4) 04:40:14 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) prlimit64(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080)) [ 560.971950] audit: type=1326 audit(1529728814.970:819): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2755 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:15 executing program 3: fcntl$getown(0xffffffffffffff9c, 0x9) chown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) [ 561.038759] audit: type=1326 audit(1529728815.011:820): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2759 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50350}]}) pipe(&(0x7f0000000000)) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) 04:40:15 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) socket$inet6(0xa, 0x0, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000001200)=@in={0x0, 0x0, @rand_addr}, &(0x7f0000001280)=0x80) 04:40:15 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) fcntl$getown(0xffffffffffffff9c, 0x9) chown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 04:40:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000)) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4) 04:40:15 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000040)) 04:40:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50350}]}) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) 04:40:15 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000080)=""/36) 04:40:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000)) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4) 04:40:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50350}]}) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) 04:40:15 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) fcntl$getown(0xffffffffffffff9c, 0x9) chown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 04:40:15 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000080)=""/36) 04:40:15 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000001200)=@in={0x0, 0x0, @rand_addr}, &(0x7f0000001280)=0x80) 04:40:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4080000000000006}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000)) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4) 04:40:15 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x1, 0x1b0, [0x0, 0x200000c0, 0x20000240, 0x20000270], 0x0, &(0x7f0000000040), &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_1\x00', 'veth1_to_team\x00', 'ip_vti0\x00', 'tunl0\x00', @random="5db0ba403af9", [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0xc0, 0xf0, 0x120, [@nfacct={'nfacct\x00', 0x28, {{'syz1\x00'}}}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@STANDARD={'\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x228) 04:40:15 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) prlimit64(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080)) 04:40:16 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) fcntl$getown(0xffffffffffffff9c, 0x9) chown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 04:40:16 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000080)=""/36) [ 561.998507] kernel msg: ebtables bug: please report to author: Valid hook without chain 04:40:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50350}]}) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) 04:40:16 executing program 1: pipe(&(0x7f0000000000)) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) 04:40:16 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000001200)=@in={0x0, 0x0, @rand_addr}, &(0x7f0000001280)=0x80) 04:40:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f00000001c0), 0x10) 04:40:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) fcntl$getown(0xffffffffffffff9c, 0x9) chown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 04:40:16 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x5023f}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000080)=""/36) 04:40:16 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50355}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 04:40:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) fcntl$getown(0xffffffffffffff9c, 0x9) chown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 04:40:16 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x5023f}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000080)=""/36) 04:40:16 executing program 1: pipe(&(0x7f0000000000)) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) 04:40:16 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000001200)=@in={0x0, 0x0, @rand_addr}, &(0x7f0000001280)=0x80) 04:40:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4080000000000006}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000)) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4) 04:40:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) fcntl$getown(0xffffffffffffff9c, 0x9) chown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 04:40:16 executing program 1: pipe(&(0x7f0000000000)) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) 04:40:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) ustat(0x0, &(0x7f0000000000)) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) 04:40:16 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50355}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 04:40:16 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x5023f}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000080)=""/36) 04:40:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) creat(&(0x7f0000000600)='./file0\x00', 0x0) sched_yield() [ 562.984142] kauditd_printk_skb: 3 callbacks suppressed [ 562.984164] audit: type=1326 audit(1529728816.982:824): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2885 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:17 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000001200)=@in={0x0, 0x0, @rand_addr}, &(0x7f0000001280)=0x80) 04:40:17 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) fcntl$getown(0xffffffffffffff9c, 0x9) chown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 04:40:17 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50350}]}) pipe(&(0x7f0000000000)) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) 04:40:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000080)=""/36) [ 563.106449] audit: type=1326 audit(1529728817.105:825): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2890 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:17 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50355}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 04:40:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) creat(&(0x7f0000000600)='./file0\x00', 0x0) sched_yield() 04:40:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) add_key(&(0x7f0000001880)='id_resolver\x00', &(0x7f00000018c0)={0x73, 0x79, 0x7a}, &(0x7f0000001900), 0x0, 0xfffffffffffffffd) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) 04:40:17 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) fcntl$getown(0xffffffffffffff9c, 0x9) chown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 04:40:17 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50350}]}) pipe(&(0x7f0000000000)) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) 04:40:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4080000000000006}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000)) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4) 04:40:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000080)=""/36) 04:40:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) creat(&(0x7f0000000600)='./file0\x00', 0x0) sched_yield() 04:40:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) add_key(&(0x7f0000001880)='id_resolver\x00', &(0x7f00000018c0)={0x73, 0x79, 0x7a}, &(0x7f0000001900), 0x0, 0xfffffffffffffffd) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) 04:40:17 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50355}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 04:40:17 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50350}]}) pipe(&(0x7f0000000000)) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) 04:40:17 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) fcntl$getown(0xffffffffffffff9c, 0x9) chown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) [ 563.965785] audit: type=1326 audit(1529728817.964:826): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2938 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:18 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000001200)=@in={0x0, 0x0, @rand_addr}, &(0x7f0000001280)=0x80) 04:40:18 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000080)=""/36) 04:40:18 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) fcntl$getown(0xffffffffffffff9c, 0x9) chown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 04:40:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000080)}) pipe(&(0x7f0000000000)) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) 04:40:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) 04:40:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50355}]}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) [ 564.093241] audit: type=1326 audit(1529728818.091:827): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2942 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:18 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) creat(&(0x7f0000000600)='./file0\x00', 0x0) sched_yield() [ 564.220819] audit: type=1326 audit(1529728818.205:828): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2947 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:18 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x5023f}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000080)=""/36) 04:40:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000080)}) pipe(&(0x7f0000000000)) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) 04:40:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) 04:40:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50355}]}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 04:40:18 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x5023f}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000080)=""/36) 04:40:18 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) sched_yield() 04:40:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000080)}) pipe(&(0x7f0000000000)) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) 04:40:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5009f}]}) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000240), 0x8) 04:40:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x50350}]}) pipe(&(0x7f0000000000)) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) 04:40:19 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000001200)=@in={0x0, 0x0, @rand_addr}, &(0x7f0000001280)=0x80) 04:40:19 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x5023f}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000080)=""/36) 04:40:19 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50355}]}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 04:40:19 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) fcntl$getown(0xffffffffffffff9c, 0x9) chown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 04:40:19 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) 04:40:19 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) sched_yield() 04:40:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5009f}]}) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000240), 0x8) 04:40:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x50350}]}) pipe(&(0x7f0000000000)) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) [ 565.175616] audit: type=1326 audit(1529728819.172:829): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2997 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 565.257682] audit: type=1326 audit(1529728819.256:830): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3008 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:19 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000080)=""/36) 04:40:19 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) sched_yield() 04:40:19 executing program 5: openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 04:40:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5009f}]}) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000240), 0x8) 04:40:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x50350}]}) pipe(&(0x7f0000000000)) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) 04:40:19 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) [ 565.412822] audit: type=1326 audit(1529728819.411:831): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3019 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:19 executing program 5: openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 04:40:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe(&(0x7f0000000000)) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) [ 565.623997] audit: type=1326 audit(1529728819.622:832): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3037 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) fcntl$getown(0xffffffffffffff9c, 0x9) chown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 04:40:20 executing program 4: creat(&(0x7f0000000600)='./file0\x00', 0x0) sched_yield() 04:40:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5009f}]}) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000240), 0x8) 04:40:20 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) 04:40:20 executing program 5: openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 04:40:20 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f00000001c0)={0x0, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @multicast1=0xe0000001}, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)='vcan0\x00'}) [ 566.172573] audit: type=1326 audit(1529728820.171:833): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3051 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:20 executing program 4: creat(&(0x7f0000000600)='./file0\x00', 0x0) sched_yield() 04:40:20 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50355}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 04:40:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000080)=""/36) 04:40:20 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) 04:40:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5009f}]}) read$eventfd(0xffffffffffffffff, &(0x7f0000000240), 0x8) 04:40:20 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f00000001c0)={0x0, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @multicast1=0xe0000001}, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)='vcan0\x00'}) 04:40:20 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50355}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 04:40:20 executing program 4: creat(&(0x7f0000000600)='./file0\x00', 0x0) sched_yield() 04:40:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe(&(0x7f0000000000)) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) 04:40:20 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) 04:40:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5009f}]}) read$eventfd(0xffffffffffffffff, &(0x7f0000000240), 0x8) 04:40:21 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) creat(&(0x7f0000000600)='./file0\x00', 0x0) sched_yield() 04:40:21 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50355}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 04:40:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000000c0)=@abs, 0x6e) 04:40:21 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000140)) 04:40:21 executing program 6: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) 04:40:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)) openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 04:40:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5009f}]}) read$eventfd(0xffffffffffffffff, &(0x7f0000000240), 0x8) 04:40:21 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000080)=""/36) 04:40:21 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) creat(&(0x7f0000000600)='./file0\x00', 0x0) sched_yield() 04:40:21 executing program 6: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) 04:40:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000000c0)=@abs, 0x6e) 04:40:21 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000140)) 04:40:21 executing program 2: mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000240), 0x8) 04:40:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe(&(0x7f0000000000)) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) 04:40:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)) openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 04:40:21 executing program 2: mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000240), 0x8) 04:40:21 executing program 6: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) 04:40:21 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) creat(&(0x7f0000000600)='./file0\x00', 0x0) sched_yield() 04:40:21 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000140)) 04:40:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000000c0)=@abs, 0x6e) 04:40:21 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) 04:40:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) creat(&(0x7f0000000600)='./file0\x00', 0x0) sched_yield() 04:40:21 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000140)) 04:40:22 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000140)) 04:40:22 executing program 2: mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000240), 0x8) 04:40:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) creat(&(0x7f0000000600)='./file0\x00', 0x0) sched_yield() 04:40:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)) openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 04:40:22 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) 04:40:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000000c0)=@abs, 0x6e) 04:40:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50355}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 04:40:22 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) 04:40:22 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5009f}]}) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000240), 0x8) 04:40:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) creat(&(0x7f0000000600)='./file0\x00', 0x0) sched_yield() 04:40:22 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000140)) 04:40:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) sendto$unix(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000000c0)=@abs, 0x6e) 04:40:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50355}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 04:40:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ad}]}) creat(&(0x7f0000000600)='./file0\x00', 0x0) sched_yield() 04:40:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) 04:40:22 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5009f}]}) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000240), 0x8) 04:40:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) sendto$unix(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000000c0)=@abs, 0x6e) 04:40:22 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000140)) 04:40:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50355}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 04:40:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ad}]}) creat(&(0x7f0000000600)='./file0\x00', 0x0) sched_yield() 04:40:22 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5009f}]}) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000240), 0x8) 04:40:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) 04:40:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) sendto$unix(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000000c0)=@abs, 0x6e) 04:40:23 executing program 7: openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000140)) 04:40:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) 04:40:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 04:40:23 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ad}]}) creat(&(0x7f0000000600)='./file0\x00', 0x0) sched_yield() 04:40:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000240), 0x8) 04:40:23 executing program 7: openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000140)) 04:40:23 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000000c0)=@abs, 0x6e) [ 569.178675] kauditd_printk_skb: 4 callbacks suppressed [ 569.178733] audit: type=1326 audit(1529728823.177:838): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3250 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) 04:40:23 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) creat(&(0x7f0000000600)='./file0\x00', 0x0) sched_yield() 04:40:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000240), 0x8) [ 569.340752] audit: type=1326 audit(1529728823.339:839): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3267 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:23 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000000c0)=@abs, 0x6e) 04:40:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000240), 0x8) 04:40:23 executing program 7: openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000140)) 04:40:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) 04:40:23 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50350}]}) pipe(&(0x7f0000000000)) ioperm(0x0, 0x0, 0x0) 04:40:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) prctl$setptracer(0x59616d61, 0x0) socket$inet_udp(0x2, 0x2, 0x0) 04:40:23 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000000c0)=@abs, 0x6e) 04:40:23 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000140)) 04:40:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 04:40:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5009f}]}) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000240), 0x8) 04:40:24 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) 04:40:24 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000140)) 04:40:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50350}]}) pipe(&(0x7f0000000000)) ioperm(0x0, 0x0, 0x0) 04:40:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) prctl$setptracer(0x59616d61, 0x0) socket$inet_udp(0x2, 0x2, 0x0) [ 570.116535] audit: type=1326 audit(1529728824.115:840): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3314 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:24 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) creat(&(0x7f0000000600)='./file0\x00', 0x0) sched_yield() 04:40:24 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000000c0)=@abs, 0x6e) 04:40:24 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000140)) 04:40:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5009f}]}) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000240), 0x8) 04:40:24 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) 04:40:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50350}]}) pipe(&(0x7f0000000000)) ioperm(0x0, 0x0, 0x0) 04:40:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) prctl$setptracer(0x59616d61, 0x0) socket$inet_udp(0x2, 0x2, 0x0) [ 570.322587] audit: type=1326 audit(1529728824.321:841): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3325 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000140)) 04:40:24 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000000c0)=@abs, 0x6e) [ 570.393170] audit: type=1326 audit(1529728824.381:842): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3324 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5009f}]}) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000240), 0x8) 04:40:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50350}]}) pipe(&(0x7f0000000000)) ioperm(0x0, 0x0, 0x0) 04:40:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000240), 0x8) 04:40:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) prctl$setptracer(0x59616d61, 0x0) socket$inet_udp(0x2, 0x2, 0x0) 04:40:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000140)) 04:40:25 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000000c0)=@abs, 0x6e) 04:40:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) [ 571.047801] audit: type=1326 audit(1529728825.046:843): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3352 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 571.107687] audit: type=1326 audit(1529728825.091:844): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3361 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000000c0)=@abs, 0x6e) 04:40:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50350}]}) ioperm(0x0, 0x0, 0x0) 04:40:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) socket$inet_udp(0x2, 0x2, 0x0) 04:40:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000140)) 04:40:25 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) 04:40:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) creat(&(0x7f0000000600)='./file0\x00', 0x0) sched_yield() [ 571.306639] audit: type=1326 audit(1529728825.305:845): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3375 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000000c0)=@abs, 0x6e) 04:40:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000140)) [ 571.363970] audit: type=1326 audit(1529728825.359:846): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3383 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) socket$inet_udp(0x2, 0x2, 0x0) 04:40:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50350}]}) ioperm(0x0, 0x0, 0x0) 04:40:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000000c0)=@abs, 0x6e) 04:40:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000240), 0x8) 04:40:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000000c0)=@abs, 0x6e) 04:40:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000140)) 04:40:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) socket$inet_udp(0x2, 0x2, 0x0) 04:40:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50350}]}) ioperm(0x0, 0x0, 0x0) 04:40:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) [ 572.041471] audit: type=1326 audit(1529728826.040:847): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3410 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 04:40:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000000c0)=@abs, 0x6e) 04:40:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000140)) 04:40:26 executing program 0: pipe(&(0x7f0000000000)) ioperm(0x0, 0x0, 0x0) 04:40:26 executing program 1: prctl$setptracer(0x59616d61, 0x0) socket$inet_udp(0x2, 0x2, 0x0) 04:40:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) 04:40:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d5}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 04:40:26 executing program 0: pipe(&(0x7f0000000000)) ioperm(0x0, 0x0, 0x0) 04:40:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000140)) 04:40:26 executing program 1: prctl$setptracer(0x59616d61, 0x0) socket$inet_udp(0x2, 0x2, 0x0) 04:40:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 04:40:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d5}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 04:40:26 executing program 1: prctl$setptracer(0x59616d61, 0x0) socket$inet_udp(0x2, 0x2, 0x0) 04:40:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000000c0)=@abs, 0x6e) 04:40:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000240), 0x8) 04:40:26 executing program 0: pipe(&(0x7f0000000000)) ioperm(0x0, 0x0, 0x0) 04:40:27 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) prctl$setptracer(0x59616d61, 0x0) socket$inet_udp(0x2, 0x2, 0x0) 04:40:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000000c0)=@abs, 0x6e) 04:40:27 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50350}]}) pipe(&(0x7f0000000000)) ioperm(0x0, 0x0, 0x0) 04:40:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d5}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 04:40:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 04:40:27 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50350}]}) pipe(&(0x7f0000000000)) ioperm(0x0, 0x0, 0x0) 04:40:27 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) prctl$setptracer(0x59616d61, 0x0) socket$inet_udp(0x2, 0x2, 0x0) 04:40:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) arch_prctl(0x0, &(0x7f0000000580)) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000), 0x4) 04:40:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000140)) 04:40:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d5}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 04:40:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 04:40:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5009f}]}) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000240), 0x8) 04:40:27 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) prctl$setptracer(0x59616d61, 0x0) socket$inet_udp(0x2, 0x2, 0x0) 04:40:27 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50350}]}) pipe(&(0x7f0000000000)) ioperm(0x0, 0x0, 0x0) 04:40:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) arch_prctl(0x0, &(0x7f0000000580)) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000), 0x4) 04:40:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d5}]}) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 04:40:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 04:40:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000000c0)=@abs, 0x6e) 04:40:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) prctl$setptracer(0x59616d61, 0x0) socket$inet_udp(0x2, 0x2, 0x0) 04:40:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000080)}) pipe(&(0x7f0000000000)) ioperm(0x0, 0x0, 0x0) 04:40:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000100)) 04:40:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 04:40:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d5}]}) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 04:40:28 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) arch_prctl(0x0, &(0x7f0000000580)) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000), 0x4) 04:40:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000140)) 04:40:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000080)}) pipe(&(0x7f0000000000)) ioperm(0x0, 0x0, 0x0) 04:40:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) prctl$setptracer(0x59616d61, 0x0) socket$inet_udp(0x2, 0x2, 0x0) 04:40:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d5}]}) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 04:40:28 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 04:40:28 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) arch_prctl(0x0, &(0x7f0000000580)) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000), 0x4) 04:40:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000100)) 04:40:28 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 04:40:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000080)}) pipe(&(0x7f0000000000)) ioperm(0x0, 0x0, 0x0) [ 574.510357] kauditd_printk_skb: 6 callbacks suppressed [ 574.510380] audit: type=1326 audit(1529728828.508:854): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3569 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000000c0)=@abs, 0x6e) 04:40:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) prctl$setptracer(0x59616d61, 0x0) socket$inet_udp(0x2, 0x2, 0x0) 04:40:29 executing program 4: creat(&(0x7f0000000080)='./file0\x00', 0x0) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 04:40:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000), 0x4) 04:40:29 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000100)) 04:40:29 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 04:40:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x50350}]}) pipe(&(0x7f0000000000)) ioperm(0x0, 0x0, 0x0) [ 575.071462] audit: type=1326 audit(1529728829.069:855): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3592 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:29 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000100)) 04:40:29 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 04:40:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000), 0x4) 04:40:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x50350}]}) pipe(&(0x7f0000000000)) ioperm(0x0, 0x0, 0x0) 04:40:29 executing program 4: creat(&(0x7f0000000080)='./file0\x00', 0x0) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 04:40:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) prctl$setptracer(0x59616d61, 0x0) socket$inet_udp(0x2, 0x2, 0x0) 04:40:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000080)) 04:40:29 executing program 4: creat(&(0x7f0000000080)='./file0\x00', 0x0) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 04:40:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x50350}]}) pipe(&(0x7f0000000000)) ioperm(0x0, 0x0, 0x0) 04:40:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) prctl$setptracer(0x59616d61, 0x0) socket$inet_udp(0x2, 0x2, 0x0) 04:40:29 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000100)) 04:40:29 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 04:40:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000080)) 04:40:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000), 0x4) 04:40:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) request_key(&(0x7f0000000180)='.dead\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000200)='/dev/uinput\x00', 0x0) sched_getscheduler(0x0) 04:40:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe(&(0x7f0000000000)) ioperm(0x0, 0x0, 0x0) 04:40:29 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d5}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) [ 576.018791] audit: type=1326 audit(1529728830.017:856): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3641 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:30 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 04:40:30 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) prctl$setptracer(0x59616d61, 0x0) socket$inet_udp(0x2, 0x2, 0x0) 04:40:30 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000100)) 04:40:30 executing program 6: arch_prctl(0x0, &(0x7f0000000580)) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000), 0x4) 04:40:30 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d5}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 04:40:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000080)) 04:40:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) request_key(&(0x7f0000000180)='.dead\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000200)='/dev/uinput\x00', 0x0) sched_getscheduler(0x0) 04:40:30 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d5}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 04:40:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 04:40:30 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) prctl$setptracer(0x59616d61, 0x0) socket$inet_udp(0x2, 0x2, 0x0) 04:40:30 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000100)) 04:40:30 executing program 6: arch_prctl(0x0, &(0x7f0000000580)) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000), 0x4) 04:40:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000080)) [ 576.492761] audit: type=1326 audit(1529728830.491:857): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3680 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) request_key(&(0x7f0000000180)='.dead\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000200)='/dev/uinput\x00', 0x0) sched_getscheduler(0x0) 04:40:30 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe(&(0x7f0000000000)) ioperm(0x0, 0x0, 0x0) 04:40:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) creat(&(0x7f0000000080)='./file0\x00', 0x0) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 04:40:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 04:40:30 executing program 2: accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000100)) 04:40:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000080)) 04:40:30 executing program 6: arch_prctl(0x0, &(0x7f0000000580)) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000), 0x4) 04:40:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) request_key(&(0x7f0000000180)='.dead\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000200)='/dev/uinput\x00', 0x0) sched_getscheduler(0x0) [ 576.981586] audit: type=1326 audit(1529728830.980:858): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3716 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:31 executing program 2: accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000100)) 04:40:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 04:40:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) creat(&(0x7f0000000080)='./file0\x00', 0x0) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 04:40:31 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) arch_prctl(0x0, &(0x7f0000000580)) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000), 0x4) 04:40:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) prctl$setptracer(0x59616d61, 0x0) socket$inet_udp(0x2, 0x2, 0x0) 04:40:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000080)) 04:40:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) sched_getscheduler(0x0) 04:40:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) creat(&(0x7f0000000080)='./file0\x00', 0x0) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 04:40:31 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) arch_prctl(0x0, &(0x7f0000000580)) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000), 0x4) [ 577.411522] audit: type=1326 audit(1529728831.410:859): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3746 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:31 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe(&(0x7f0000000000)) ioperm(0x0, 0x0, 0x0) 04:40:31 executing program 2: accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000100)) 04:40:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 04:40:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501d5}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 04:40:31 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) arch_prctl(0x0, &(0x7f0000000580)) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000), 0x4) 04:40:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) sched_getscheduler(0x0) 04:40:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000080)) 04:40:32 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000100)) [ 577.966832] audit: type=1326 audit(1529728831.965:860): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3766 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:32 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) arch_prctl(0x0, &(0x7f0000000580)) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000), 0x4) 04:40:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501d5}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 04:40:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 04:40:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) prctl$setptracer(0x59616d61, 0x0) socket$inet_udp(0x2, 0x2, 0x0) 04:40:32 executing program 7: openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000080)) 04:40:32 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) sched_getscheduler(0x0) 04:40:32 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000100)) 04:40:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501d5}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) [ 578.384290] audit: type=1326 audit(1529728832.382:861): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3796 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:32 executing program 7: openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000080)) 04:40:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 04:40:32 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) arch_prctl(0x0, &(0x7f0000000580)) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000), 0x4) 04:40:32 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000100)) 04:40:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 04:40:32 executing program 3: request_key(&(0x7f0000000180)='.dead\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000200)='/dev/uinput\x00', 0x0) sched_getscheduler(0x0) 04:40:32 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000240)=@nfc={0x27, 0x1}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000040)="26fb583d066ae6a2abd2e068d40b1a218fcf45b1dd9b5ac63dffa4349f46e4e10174ca5f99936b59ff00a7e0dcaa7c7e833eeca3cac47004418e360ecd98844b09", 0x41}], 0x1, &(0x7f0000000000)}}], 0x1, 0x0) [ 578.907801] audit: type=1326 audit(1529728832.906:862): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3803 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:33 executing program 7: openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000080)) 04:40:33 executing program 3: request_key(&(0x7f0000000180)='.dead\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000200)='/dev/uinput\x00', 0x0) sched_getscheduler(0x0) 04:40:33 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 04:40:33 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) arch_prctl(0x0, &(0x7f0000000580)) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000), 0x4) [ 579.088572] audit: type=1326 audit(1529728833.087:863): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3824 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:33 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) arch_prctl(0x0, &(0x7f0000000580)) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000), 0x4) 04:40:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000100)) 04:40:33 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 04:40:33 executing program 3: request_key(&(0x7f0000000180)='.dead\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000200)='/dev/uinput\x00', 0x0) sched_getscheduler(0x0) 04:40:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) ustat(0x0, &(0x7f0000000000)) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0, &(0x7f0000000140)) 04:40:33 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000080)) 04:40:33 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) request_key(&(0x7f0000000180)='.dead\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000200)='/dev/uinput\x00', 0x0) sched_getscheduler(0x0) 04:40:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000100)) 04:40:33 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) arch_prctl(0x0, &(0x7f0000000580)) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000), 0x4) 04:40:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 04:40:33 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000080)) 04:40:33 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 04:40:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) ustat(0x0, &(0x7f0000000000)) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0, &(0x7f0000000140)) 04:40:33 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) request_key(&(0x7f0000000180)='.dead\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000200)='/dev/uinput\x00', 0x0) sched_getscheduler(0x0) [ 579.857210] audit: type=1326 audit(1529728833.855:864): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3871 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 04:40:34 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) arch_prctl(0x0, &(0x7f0000000580)) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000), 0x4) 04:40:34 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000100)) 04:40:34 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000080)) 04:40:34 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) request_key(&(0x7f0000000180)='.dead\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000200)='/dev/uinput\x00', 0x0) sched_getscheduler(0x0) 04:40:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) ustat(0x0, &(0x7f0000000000)) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0, &(0x7f0000000140)) 04:40:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 04:40:34 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000100)) [ 580.075893] audit: type=1326 audit(1529728834.068:865): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3892 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:34 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) arch_prctl(0x0, &(0x7f0000000580)) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000), 0x4) 04:40:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) request_key(&(0x7f0000000180)='.dead\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000200)='/dev/uinput\x00', 0x0) sched_getscheduler(0x0) 04:40:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000080)) [ 580.209406] audit: type=1326 audit(1529728834.208:866): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3900 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:34 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 04:40:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) ustat(0x0, &(0x7f0000000000)) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0, &(0x7f0000000140)) 04:40:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 04:40:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000080)) 04:40:34 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000100)) [ 580.822119] audit: type=1326 audit(1529728834.820:867): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3923 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 04:40:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) request_key(&(0x7f0000000180)='.dead\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000200)='/dev/uinput\x00', 0x0) sched_getscheduler(0x0) 04:40:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000080)) 04:40:34 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000100)) 04:40:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 04:40:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0, &(0x7f0000000140)) [ 581.037430] audit: type=1326 audit(1529728835.036:868): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3939 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000080)) 04:40:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) request_key(&(0x7f0000000180)='.dead\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000200)='/dev/uinput\x00', 0x0) sched_getscheduler(0x0) 04:40:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0, &(0x7f0000000140)) 04:40:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) arch_prctl(0x0, &(0x7f0000000580)) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000), 0x4) 04:40:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x54) [ 581.259766] audit: type=1326 audit(1529728835.258:869): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3958 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) request_key(&(0x7f0000000180)='.dead\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000200)='/dev/uinput\x00', 0x0) sched_getscheduler(0x0) 04:40:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000100)) 04:40:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000080)) 04:40:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0, &(0x7f0000000140)) 04:40:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x54) [ 581.774469] audit: type=1326 audit(1529728835.773:870): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3966 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:35 executing program 1: ustat(0x0, &(0x7f0000000000)) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0, &(0x7f0000000140)) 04:40:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)={'broute\x00'}, &(0x7f0000000100)=0x78) 04:40:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) request_key(&(0x7f0000000180)='.dead\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000200)='/dev/uinput\x00', 0x0) sched_getscheduler(0x0) 04:40:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000080)) 04:40:35 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 04:40:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000200)={'rose0\x00'}) 04:40:36 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 04:40:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) request_key(&(0x7f0000000180)='.dead\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000200)='/dev/uinput\x00', 0x0) sched_getscheduler(0x0) 04:40:36 executing program 1: ustat(0x0, &(0x7f0000000000)) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0, &(0x7f0000000140)) 04:40:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) arch_prctl(0x0, &(0x7f0000000580)) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000), 0x4) 04:40:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000080)) 04:40:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)={'broute\x00'}, &(0x7f0000000100)=0x78) [ 582.274324] audit: type=1326 audit(1529728836.272:871): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4010 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 582.350356] audit: type=1326 audit(1529728836.337:872): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4017 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000100)) 04:40:36 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 04:40:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000200)={'rose0\x00'}) 04:40:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) request_key(&(0x7f0000000180)='.dead\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000200)='/dev/uinput\x00', 0x0) sched_getscheduler(0x0) 04:40:36 executing program 1: ustat(0x0, &(0x7f0000000000)) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0, &(0x7f0000000140)) 04:40:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)={'broute\x00'}, &(0x7f0000000100)=0x78) [ 582.701631] audit: type=1326 audit(1529728836.700:873): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4026 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:36 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 04:40:36 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) ustat(0x0, &(0x7f0000000000)) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0, &(0x7f0000000140)) 04:40:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)={'broute\x00'}, &(0x7f0000000100)=0x78) 04:40:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000200)={'rose0\x00'}) 04:40:36 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 04:40:36 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) ustat(0x0, &(0x7f0000000000)) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0, &(0x7f0000000140)) 04:40:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)={'broute\x00'}, &(0x7f0000000100)=0x78) 04:40:37 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000080)) 04:40:37 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 04:40:37 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) ustat(0x0, &(0x7f0000000000)) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0, &(0x7f0000000140)) 04:40:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000100)) 04:40:37 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000200)={'rose0\x00'}) 04:40:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)={'broute\x00'}, &(0x7f0000000100)=0x78) 04:40:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) write$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) 04:40:37 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000300)}) ustat(0x0, &(0x7f0000000000)) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0, &(0x7f0000000140)) 04:40:37 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) creat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 04:40:37 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) request_key(&(0x7f0000000180)='.dead\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000200)='/dev/uinput\x00', 0x0) sched_getscheduler(0x0) 04:40:37 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) creat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 04:40:37 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000300)}) ustat(0x0, &(0x7f0000000000)) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0, &(0x7f0000000140)) 04:40:37 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000200)={'rose0\x00'}) 04:40:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)={'broute\x00'}, &(0x7f0000000100)=0x78) 04:40:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) write$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) 04:40:37 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) creat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 04:40:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000080)) 04:40:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000300)}) ustat(0x0, &(0x7f0000000000)) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0, &(0x7f0000000140)) 04:40:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000200)={'rose0\x00'}) 04:40:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) request_key(&(0x7f0000000180)='.dead\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000200)='/dev/uinput\x00', 0x0) sched_getscheduler(0x0) 04:40:38 executing program 4: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)={'broute\x00'}, &(0x7f0000000100)=0x78) 04:40:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 04:40:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) write$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) 04:40:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) 04:40:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x50355}]}) ustat(0x0, &(0x7f0000000000)) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0, &(0x7f0000000140)) 04:40:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000200)={'rose0\x00'}) 04:40:38 executing program 4: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)={'broute\x00'}, &(0x7f0000000100)=0x78) 04:40:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x50355}]}) ustat(0x0, &(0x7f0000000000)) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0, &(0x7f0000000140)) 04:40:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 04:40:38 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000200)={'rose0\x00'}) 04:40:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) write$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) 04:40:38 executing program 2: 04:40:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) write$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) 04:40:39 executing program 4: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)={'broute\x00'}, &(0x7f0000000100)=0x78) 04:40:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 04:40:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) write$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) 04:40:39 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000200)={'rose0\x00'}) 04:40:39 executing program 2: 04:40:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x50355}]}) ustat(0x0, &(0x7f0000000000)) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0, &(0x7f0000000140)) 04:40:39 executing program 7: 04:40:39 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)={'broute\x00'}, &(0x7f0000000100)=0x78) 04:40:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 04:40:39 executing program 3: [ 585.677381] kauditd_printk_skb: 6 callbacks suppressed [ 585.677406] audit: type=1326 audit(1529728839.669:880): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4178 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:39 executing program 2: 04:40:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) accept$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x6e) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa}, 0x1c) 04:40:39 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)={'broute\x00'}, &(0x7f0000000100)=0x78) 04:40:39 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000200)={'rose0\x00'}) 04:40:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6}]}) ustat(0x0, &(0x7f0000000000)) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0, &(0x7f0000000140)) 04:40:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000400)={'filter\x00'}, &(0x7f0000000540)=0x24) 04:40:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000040)) bind$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x14) 04:40:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) write$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) [ 585.898961] audit: type=1326 audit(1529728839.897:881): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4202 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:40 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)={'broute\x00'}, &(0x7f0000000100)=0x78) 04:40:40 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000200)={'rose0\x00'}) 04:40:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) accept$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x6e) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa}, 0x1c) 04:40:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000400)={'filter\x00'}, &(0x7f0000000540)=0x24) 04:40:40 executing program 6: openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) write$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) 04:40:40 executing program 2: 04:40:40 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 04:40:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)={'broute\x00'}, &(0x7f0000000100)=0x78) 04:40:40 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000200)={'rose0\x00'}) 04:40:40 executing program 2: 04:40:40 executing program 6: openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) write$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) 04:40:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) accept$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x6e) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa}, 0x1c) [ 586.618441] audit: type=1326 audit(1529728840.617:882): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4250 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6}]}) ustat(0x0, &(0x7f0000000000)) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0, &(0x7f0000000140)) 04:40:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000400)={'filter\x00'}, &(0x7f0000000540)=0x24) 04:40:40 executing program 2: 04:40:40 executing program 6: openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) write$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) 04:40:40 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000200)={'rose0\x00'}) 04:40:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)={'broute\x00'}, &(0x7f0000000100)=0x78) 04:40:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) accept$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x6e) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa}, 0x1c) 04:40:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)={'broute\x00'}, &(0x7f0000000100)=0x78) [ 586.867497] audit: type=1326 audit(1529728840.866:883): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4271 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:40 executing program 2: 04:40:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000200)={'rose0\x00'}) 04:40:41 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 04:40:41 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) write$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) 04:40:41 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000400)={'filter\x00'}, &(0x7f0000000540)=0x24) 04:40:41 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa}, 0x1c) 04:40:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000200)={'rose0\x00'}) 04:40:41 executing program 2: [ 587.588657] audit: type=1326 audit(1529728841.587:884): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4297 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:41 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6}]}) ustat(0x0, &(0x7f0000000000)) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0, &(0x7f0000000140)) 04:40:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)={'broute\x00'}, &(0x7f0000000100)=0x78) 04:40:41 executing program 2: 04:40:41 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa}, 0x1c) 04:40:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000200)={'rose0\x00'}) 04:40:41 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) write$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) 04:40:41 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000400)={'filter\x00'}, &(0x7f0000000540)=0x24) 04:40:41 executing program 2: [ 587.844198] audit: type=1326 audit(1529728841.842:885): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4317 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000200)={'rose0\x00'}) 04:40:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)={'broute\x00'}, &(0x7f0000000100)=0x78) 04:40:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000400)={'filter\x00'}, &(0x7f0000000540)=0x24) 04:40:42 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) write$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) 04:40:42 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa}, 0x1c) 04:40:42 executing program 2: 04:40:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)={'broute\x00'}, &(0x7f0000000100)=0x78) 04:40:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000200)={'rose0\x00'}) 04:40:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000400)={'filter\x00'}, &(0x7f0000000540)=0x24) 04:40:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) write$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) 04:40:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000200)={'rose0\x00'}) 04:40:42 executing program 0: 04:40:42 executing program 2: 04:40:42 executing program 7: accept$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x6e) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa}, 0x1c) 04:40:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)={'broute\x00'}, &(0x7f0000000100)=0x78) 04:40:42 executing program 1: [ 588.782952] audit: type=1326 audit(1529728842.781:886): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4363 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:42 executing program 2: 04:40:42 executing program 0: 04:40:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) write$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) 04:40:42 executing program 7: accept$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x6e) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa}, 0x1c) 04:40:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000200)={'rose0\x00'}) 04:40:42 executing program 1: 04:40:43 executing program 3: openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000400)={'filter\x00'}, &(0x7f0000000540)=0x24) [ 589.008322] audit: type=1326 audit(1529728843.006:887): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4385 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:43 executing program 2: 04:40:43 executing program 0: 04:40:43 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) write$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) 04:40:43 executing program 1: 04:40:43 executing program 7: accept$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x6e) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa}, 0x1c) 04:40:43 executing program 3: openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000400)={'filter\x00'}, &(0x7f0000000540)=0x24) 04:40:43 executing program 2: 04:40:43 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) write$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) 04:40:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)={'broute\x00'}, &(0x7f0000000100)=0x78) 04:40:43 executing program 0: 04:40:43 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) accept$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x6e) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa}, 0x1c) 04:40:43 executing program 1: 04:40:43 executing program 2: [ 589.701429] audit: type=1326 audit(1529728843.700:888): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4418 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000200)={'rose0\x00'}) 04:40:43 executing program 3: openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000400)={'filter\x00'}, &(0x7f0000000540)=0x24) 04:40:43 executing program 2: 04:40:43 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) accept$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x6e) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa}, 0x1c) 04:40:43 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) write$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) 04:40:43 executing program 0: 04:40:43 executing program 1: [ 589.973496] audit: type=1326 audit(1529728843.972:889): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4436 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:44 executing program 2: 04:40:44 executing program 1: 04:40:44 executing program 0: 04:40:44 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) accept$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x6e) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa}, 0x1c) 04:40:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)={'broute\x00'}, &(0x7f0000000100)=0x78) 04:40:44 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000400)={'filter\x00'}, &(0x7f0000000540)=0x24) 04:40:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) write$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) 04:40:44 executing program 2: 04:40:44 executing program 0: 04:40:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000200)={'rose0\x00'}) 04:40:44 executing program 1: 04:40:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) accept$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x6e) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa}, 0x1c) 04:40:44 executing program 0: 04:40:44 executing program 2: 04:40:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) write$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) 04:40:44 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000400)={'filter\x00'}, &(0x7f0000000540)=0x24) [ 590.891233] kauditd_printk_skb: 1 callbacks suppressed [ 590.891256] audit: type=1326 audit(1529728844.887:891): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4509 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:44 executing program 0: 04:40:44 executing program 2: 04:40:45 executing program 1: 04:40:45 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000400)={'filter\x00'}, &(0x7f0000000540)=0x24) [ 590.976546] audit: type=1326 audit(1529728844.945:892): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4517 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000400)={'filter\x00'}, &(0x7f0000000540)=0x24) 04:40:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) accept$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x6e) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa}, 0x1c) 04:40:45 executing program 0: 04:40:45 executing program 1: 04:40:45 executing program 2: 04:40:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) write$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) 04:40:45 executing program 4: 04:40:45 executing program 1: 04:40:45 executing program 2: 04:40:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) accept$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x6e) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa}, 0x1c) 04:40:45 executing program 0: 04:40:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000400)={'filter\x00'}, &(0x7f0000000540)=0x24) 04:40:45 executing program 5: [ 591.888395] audit: type=1326 audit(1529728845.886:893): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4551 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:45 executing program 2: 04:40:45 executing program 4: 04:40:45 executing program 1: 04:40:45 executing program 0: 04:40:46 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000400)={'filter\x00'}, &(0x7f0000000540)=0x24) 04:40:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) accept$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x6e) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa}, 0x1c) 04:40:46 executing program 5: 04:40:46 executing program 4: 04:40:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) write$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) 04:40:46 executing program 2: 04:40:46 executing program 1: 04:40:46 executing program 0: 04:40:46 executing program 5: 04:40:46 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000400)={'filter\x00'}, &(0x7f0000000540)=0x24) 04:40:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) accept$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x6e) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa}, 0x1c) 04:40:46 executing program 4: [ 592.801609] audit: type=1326 audit(1529728846.800:894): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4590 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:46 executing program 5: 04:40:46 executing program 4: 04:40:46 executing program 0: 04:40:46 executing program 2: 04:40:46 executing program 1: 04:40:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) accept$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x6e) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa}, 0x1c) 04:40:47 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000400)={'filter\x00'}, &(0x7f0000000540)=0x24) 04:40:47 executing program 5: 04:40:47 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000400)={'filter\x00'}, &(0x7f0000000540)=0x24) 04:40:47 executing program 4: 04:40:47 executing program 0: 04:40:47 executing program 1: 04:40:47 executing program 2: 04:40:47 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) accept$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x6e) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa}, 0x1c) 04:40:47 executing program 5: 04:40:47 executing program 6: 04:40:47 executing program 4: [ 593.761129] audit: type=1326 audit(1529728847.759:895): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4629 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:47 executing program 1: 04:40:47 executing program 6: 04:40:47 executing program 5: 04:40:47 executing program 0: 04:40:47 executing program 2: 04:40:47 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000400)={'filter\x00'}, &(0x7f0000000540)=0x24) 04:40:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 04:40:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) socket$alg(0x26, 0x5, 0x0) socket$key(0xf, 0x3, 0x2) 04:40:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e2}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) fchmod(0xffffffffffffffff, 0x0) [ 594.011304] audit: type=1326 audit(1529728848.009:896): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4651 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000100)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f00000000c0)={'team_slave_0\x00'}) 04:40:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) sched_getaffinity(0x0, 0x8, &(0x7f0000000080)) 04:40:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040)) 04:40:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000280), 0x0) 04:40:48 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) accept$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x6e) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa}, 0x1c) 04:40:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/134, 0x86) 04:40:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040)) 04:40:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) socket$alg(0x26, 0x5, 0x0) socket$key(0xf, 0x3, 0x2) 04:40:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 04:40:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e2}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) fchmod(0xffffffffffffffff, 0x0) [ 594.736690] audit: type=1326 audit(1529728848.735:897): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4703 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) socket$alg(0x26, 0x5, 0x0) socket$key(0xf, 0x3, 0x2) 04:40:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040)) 04:40:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000400)={'filter\x00'}, &(0x7f0000000540)=0x24) 04:40:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e2}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) fchmod(0xffffffffffffffff, 0x0) 04:40:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/134, 0x86) 04:40:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 04:40:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000280), 0x0) [ 595.038168] audit: type=1326 audit(1529728849.036:898): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4723 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040)) 04:40:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) socket$alg(0x26, 0x5, 0x0) socket$key(0xf, 0x3, 0x2) 04:40:49 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 04:40:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) accept$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x6e) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa}, 0x1c) 04:40:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e2}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) fchmod(0xffffffffffffffff, 0x0) 04:40:49 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000280), 0x0) 04:40:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/134, 0x86) 04:40:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040)) 04:40:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) socket$key(0xf, 0x3, 0x2) 04:40:49 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) [ 595.721803] audit: type=1326 audit(1529728849.720:899): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4758 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) socket$key(0xf, 0x3, 0x2) 04:40:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000400)={'filter\x00'}, &(0x7f0000000540)=0x24) 04:40:49 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000280), 0x0) 04:40:49 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 04:40:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040)) 04:40:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e2}]}) fchmod(0xffffffffffffffff, 0x0) 04:40:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/134, 0x86) 04:40:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) socket$key(0xf, 0x3, 0x2) [ 596.033735] audit: type=1326 audit(1529728850.032:900): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4781 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:50 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e2}]}) fchmod(0xffffffffffffffff, 0x0) 04:40:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040)) 04:40:50 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 04:40:50 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000280), 0x0) 04:40:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/134, 0x86) 04:40:50 executing program 2: socket$alg(0x26, 0x5, 0x0) socket$key(0xf, 0x3, 0x2) 04:40:50 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e2}]}) fchmod(0xffffffffffffffff, 0x0) 04:40:50 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000080)) 04:40:50 executing program 2: socket$alg(0x26, 0x5, 0x0) socket$key(0xf, 0x3, 0x2) 04:40:50 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) ioprio_get$uid(0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040)) 04:40:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/134, 0x86) 04:40:50 executing program 6: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) fchmod(0xffffffffffffffff, 0x0) 04:40:50 executing program 4: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 04:40:50 executing program 5: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040)) 04:40:50 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000280), 0x0) 04:40:50 executing program 2: socket$alg(0x26, 0x5, 0x0) socket$key(0xf, 0x3, 0x2) 04:40:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000180)) 04:40:51 executing program 5: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040)) 04:40:51 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) socket$alg(0x26, 0x5, 0x0) socket$key(0xf, 0x3, 0x2) 04:40:51 executing program 4: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 04:40:51 executing program 6: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) fchmod(0xffffffffffffffff, 0x0) 04:40:51 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/134, 0x86) 04:40:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000280), 0x0) 04:40:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000180)) 04:40:51 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) ioprio_get$uid(0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040)) 04:40:51 executing program 4: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 04:40:51 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) socket$alg(0x26, 0x5, 0x0) socket$key(0xf, 0x3, 0x2) 04:40:51 executing program 5: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040)) 04:40:51 executing program 6: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) fchmod(0xffffffffffffffff, 0x0) 04:40:51 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/134, 0x86) 04:40:51 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000280), 0x0) 04:40:51 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) ioprio_get$uid(0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040)) 04:40:51 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 04:40:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000180)) 04:40:51 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) socket$alg(0x26, 0x5, 0x0) socket$key(0xf, 0x3, 0x2) 04:40:51 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040)) 04:40:51 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e2}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) fchmod(0xffffffffffffffff, 0x0) 04:40:51 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/134, 0x86) 04:40:51 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000280), 0x0) 04:40:51 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 04:40:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) socket$alg(0x26, 0x5, 0x0) socket$key(0xf, 0x3, 0x2) 04:40:51 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040)) 04:40:51 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) ioprio_get$uid(0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040)) 04:40:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000180)) 04:40:51 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e2}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) fchmod(0xffffffffffffffff, 0x0) 04:40:51 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/134, 0x86) 04:40:52 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000280), 0x0) 04:40:52 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 04:40:52 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040)) 04:40:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) socket$alg(0x26, 0x5, 0x0) socket$key(0xf, 0x3, 0x2) 04:40:52 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000280), 0x0) 04:40:52 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e2}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) fchmod(0xffffffffffffffff, 0x0) 04:40:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000180)) 04:40:52 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040)) 04:40:52 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/134, 0x86) 04:40:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 04:40:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040)) 04:40:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) socket$alg(0x26, 0x5, 0x0) socket$key(0xf, 0x3, 0x2) 04:40:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040)) 04:40:52 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/134, 0x86) 04:40:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) fchmod(0xffffffffffffffff, 0x0) 04:40:52 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000280), 0x0) 04:40:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000180)) 04:40:52 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040)) 04:40:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 04:40:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) socket$alg(0x26, 0x5, 0x0) socket$key(0xf, 0x3, 0x2) 04:40:52 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000280), 0x0) 04:40:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) fchmod(0xffffffffffffffff, 0x0) 04:40:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040)) 04:40:52 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/134, 0x86) 04:40:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000180)) 04:40:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 04:40:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) socket$alg(0x26, 0x5, 0x0) socket$key(0xf, 0x3, 0x2) 04:40:52 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040)) 04:40:52 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000280), 0x0) 04:40:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$inet_tcp(0x2, 0x1, 0x0) modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/134, 0x86) 04:40:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040)) 04:40:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) fchmod(0xffffffffffffffff, 0x0) 04:40:53 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 04:40:53 executing program 3: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000180)) 04:40:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) socket$alg(0x26, 0x5, 0x0) socket$key(0xf, 0x3, 0x2) 04:40:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000280), 0x0) 04:40:53 executing program 7: ioprio_get$uid(0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040)) 04:40:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$inet_tcp(0x2, 0x1, 0x0) modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/134, 0x86) 04:40:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040)) 04:40:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e2}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) fchmod(0xffffffffffffffff, 0x0) 04:40:53 executing program 3: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000180)) 04:40:53 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 04:40:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000280), 0x0) 04:40:53 executing program 7: ioprio_get$uid(0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040)) 04:40:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) socket$alg(0x26, 0x5, 0x0) socket$key(0xf, 0x3, 0x2) 04:40:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$inet_tcp(0x2, 0x1, 0x0) modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/134, 0x86) 04:40:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e2}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) fchmod(0xffffffffffffffff, 0x0) 04:40:53 executing program 3: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000180)) 04:40:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040)) [ 599.547216] audit: type=1326 audit(1529728853.545:901): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5060 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:53 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 04:40:53 executing program 7: ioprio_get$uid(0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040)) 04:40:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000280), 0x0) 04:40:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/134, 0x86) 04:40:53 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000180)) 04:40:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e2}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) fchmod(0xffffffffffffffff, 0x0) 04:40:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040)) 04:40:53 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) ioprio_get$uid(0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040)) 04:40:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/134, 0x86) 04:40:53 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 04:40:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000280), 0x0) [ 599.880453] audit: type=1326 audit(1529728853.878:902): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5092 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 600.005152] audit: type=1326 audit(1529728854.003:903): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5105 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) socket$alg(0x26, 0x5, 0x0) socket$key(0xf, 0x3, 0x2) 04:40:54 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000180)) 04:40:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) fchmod(0xffffffffffffffff, 0x0) 04:40:54 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) ioprio_get$uid(0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040)) 04:40:54 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000280), 0x0) 04:40:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/134, 0x86) [ 600.509394] audit: type=1326 audit(1529728854.505:904): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5115 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:54 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000180)) 04:40:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/134, 0x86) 04:40:54 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) ioprio_get$uid(0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040)) [ 600.548742] audit: type=1326 audit(1529728854.528:905): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5116 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:54 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000280), 0x0) [ 600.655019] audit: type=1326 audit(1529728854.653:906): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5127 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000180)) [ 600.724920] audit: type=1326 audit(1529728854.713:907): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5135 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040)) 04:40:54 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) ioprio_get$uid(0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040)) 04:40:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000180)) [ 600.854298] audit: type=1326 audit(1529728854.852:908): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5148 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:54 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 04:40:54 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) ioprio_get$uid(0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040)) [ 600.977928] audit: type=1326 audit(1529728854.976:909): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5157 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) socket$alg(0x26, 0x5, 0x0) socket$key(0xf, 0x3, 0x2) 04:40:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000180)) 04:40:55 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) ioprio_get$uid(0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040)) 04:40:55 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) fchmod(0xffffffffffffffff, 0x0) [ 601.459660] audit: type=1326 audit(1529728855.458:910): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5165 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000180)) 04:40:55 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) ioprio_get$uid(0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040)) [ 601.516448] audit: type=1326 audit(1529728855.486:911): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5170 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:55 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/134, 0x86) 04:40:55 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000280), 0x0) 04:40:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000180)) [ 601.682610] audit: type=1326 audit(1529728855.681:912): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5182 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000180)) 04:40:55 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) ioprio_get$uid(0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040)) [ 601.736103] audit: type=1326 audit(1529728855.732:913): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5189 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:55 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040)) 04:40:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000180)) 04:40:55 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) ioprio_get$uid(0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040)) [ 601.873395] audit: type=1326 audit(1529728855.871:914): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5199 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:55 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) [ 601.917961] audit: type=1326 audit(1529728855.902:915): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5202 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:56 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) ioprio_get$uid(0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040)) [ 601.993790] audit: type=1326 audit(1529728855.992:916): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5208 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 602.032747] audit: type=1326 audit(1529728856.031:917): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5211 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:56 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) fchmod(0xffffffffffffffff, 0x0) 04:40:56 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) [ 602.417578] audit: type=1326 audit(1529728856.416:918): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5216 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:56 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) 04:40:56 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/134, 0x86) 04:40:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000280), 0x0) 04:40:56 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) [ 602.625327] audit: type=1326 audit(1529728856.623:919): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5227 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:40:56 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) 04:40:56 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) iopl(0x0) 04:40:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000180)) 04:40:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) dup(0xffffffffffffffff) accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000080)=0x1c) 04:40:56 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) ioprio_get$uid(0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040)) 04:40:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) 04:40:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) iopl(0x0) 04:40:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) dup(0xffffffffffffffff) accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000080)=0x1c) 04:40:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) 04:40:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) iopl(0x0) 04:40:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) dup(0xffffffffffffffff) accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000080)=0x1c) 04:40:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) 04:40:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) socket$inet_udp(0x2, 0x2, 0x0) getresgid(&(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)) 04:40:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) dup(0xffffffffffffffff) accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000080)=0x1c) 04:40:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) socket$inet_udp(0x2, 0x2, 0x0) getresgid(&(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)) 04:40:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) iopl(0x0) 04:40:57 executing program 2: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) 04:40:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x1c, 0x0) 04:40:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000080)=0x1c) 04:40:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000180)) 04:40:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x1c, 0x0) 04:40:57 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) ioprio_get$uid(0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040)) 04:40:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) iopl(0x0) 04:40:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 04:40:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) socket$inet_udp(0x2, 0x2, 0x0) getresgid(&(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)) 04:40:57 executing program 2: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) 04:40:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000080)=0x1c) 04:40:58 executing program 2: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) 04:40:58 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000080)=0x1c) 04:40:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) iopl(0x0) 04:40:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x1c, 0x0) 04:40:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) socket$inet_udp(0x2, 0x2, 0x0) getresgid(&(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)) 04:40:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 04:40:58 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) 04:40:58 executing program 4: dup(0xffffffffffffffff) accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000080)=0x1c) 04:40:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) io_setup(0x0, &(0x7f00000005c0)) ustat(0x0, &(0x7f00000000c0)) 04:40:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) iopl(0x0) 04:40:58 executing program 5: creat(&(0x7f0000000040)='./file0\x00', 0x0) iopl(0x0) 04:40:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x1c, 0x0) 04:40:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 04:40:58 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) 04:40:58 executing program 4: dup(0xffffffffffffffff) accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000080)=0x1c) 04:40:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/240, 0xf0) 04:40:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) io_setup(0x0, &(0x7f00000005c0)) ustat(0x0, &(0x7f00000000c0)) 04:40:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50355}]}) syslog(0x0, &(0x7f0000003d00)=""/4096, 0x1000) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000300)={'syz_tun\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}) 04:40:59 executing program 5: creat(&(0x7f0000000040)='./file0\x00', 0x0) iopl(0x0) 04:40:59 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) 04:40:59 executing program 4: dup(0xffffffffffffffff) accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000080)=0x1c) 04:40:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 04:40:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x1c, 0x0) 04:40:59 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) io_setup(0x0, &(0x7f00000005c0)) ustat(0x0, &(0x7f00000000c0)) 04:40:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/240, 0xf0) 04:40:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040)) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)) 04:40:59 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) dup(0xffffffffffffffff) accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000080)=0x1c) 04:40:59 executing program 5: creat(&(0x7f0000000040)='./file0\x00', 0x0) iopl(0x0) 04:40:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) 04:40:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x1c, 0x0) 04:40:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/240, 0xf0) 04:40:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 04:40:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040)) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)) 04:40:59 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) io_setup(0x0, &(0x7f00000005c0)) ustat(0x0, &(0x7f00000000c0)) 04:40:59 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) dup(0xffffffffffffffff) accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000080)=0x1c) 04:40:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) 04:40:59 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) iopl(0x0) 04:40:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x1c, 0x0) 04:40:59 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) dup(0xffffffffffffffff) accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000080)=0x1c) 04:40:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) 04:40:59 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) iopl(0x0) 04:40:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/240, 0xf0) 04:40:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 04:40:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040)) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)) 04:40:59 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) ustat(0x0, &(0x7f00000000c0)) 04:41:00 executing program 0: syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x1c, 0x0) 04:41:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) 04:41:00 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) dup(0xffffffffffffffff) accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000080)=0x1c) 04:41:00 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) iopl(0x0) 04:41:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/240, 0xf0) 04:41:00 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040)) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)) 04:41:00 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) ustat(0x0, &(0x7f00000000c0)) 04:41:00 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 04:41:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) 04:41:00 executing program 0: syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x1c, 0x0) 04:41:00 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) dup(0xffffffffffffffff) accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000080)=0x1c) 04:41:00 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) creat(&(0x7f0000000040)='./file0\x00', 0x0) iopl(0x0) 04:41:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/240, 0xf0) 04:41:00 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) ustat(0x0, &(0x7f00000000c0)) 04:41:00 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)) 04:41:00 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) dup(0xffffffffffffffff) accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000080)=0x1c) 04:41:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) 04:41:00 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 04:41:00 executing program 0: syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x1c, 0x0) 04:41:00 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) creat(&(0x7f0000000040)='./file0\x00', 0x0) iopl(0x0) 04:41:00 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)) 04:41:00 executing program 6: io_setup(0x0, &(0x7f00000005c0)) ustat(0x0, &(0x7f00000000c0)) 04:41:00 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) dup(0xffffffffffffffff) accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000080)=0x1c) 04:41:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/240, 0xf0) 04:41:00 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 04:41:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) 04:41:00 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x1c, 0x0) 04:41:00 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) creat(&(0x7f0000000040)='./file0\x00', 0x0) iopl(0x0) [ 606.892952] kauditd_printk_skb: 5 callbacks suppressed [ 606.892975] audit: type=1326 audit(1529728860.889:925): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5542 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:00 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) dup(0xffffffffffffffff) accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000080)=0x1c) 04:41:00 executing program 6: io_setup(0x0, &(0x7f00000005c0)) ustat(0x0, &(0x7f00000000c0)) 04:41:00 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)) 04:41:01 executing program 3: mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/240, 0xf0) 04:41:01 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 04:41:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) iopl(0x0) 04:41:01 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x1c, 0x0) 04:41:01 executing program 6: io_setup(0x0, &(0x7f00000005c0)) ustat(0x0, &(0x7f00000000c0)) 04:41:01 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) dup(0xffffffffffffffff) accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000080)=0x1c) 04:41:01 executing program 3: mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/240, 0xf0) 04:41:01 executing program 7: ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040)) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)) 04:41:01 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 04:41:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) iopl(0x0) 04:41:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) 04:41:01 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) io_setup(0x0, &(0x7f00000005c0)) ustat(0x0, &(0x7f00000000c0)) 04:41:01 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x1c, 0x0) 04:41:01 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) dup(0xffffffffffffffff) accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000080)=0x1c) 04:41:01 executing program 3: mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/240, 0xf0) 04:41:01 executing program 7: ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040)) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)) 04:41:01 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 04:41:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) iopl(0x0) [ 607.810219] audit: type=1326 audit(1529728861.808:926): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5604 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:01 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) io_setup(0x0, &(0x7f00000005c0)) ustat(0x0, &(0x7f00000000c0)) 04:41:01 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/240, 0xf0) [ 607.868651] audit: type=1326 audit(1529728861.867:927): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5614 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:01 executing program 7: ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040)) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)) 04:41:01 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 04:41:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) iopl(0x0) 04:41:01 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x1c, 0x0) 04:41:02 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) io_setup(0x0, &(0x7f00000005c0)) ustat(0x0, &(0x7f00000000c0)) 04:41:02 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/240, 0xf0) [ 608.073374] audit: type=1326 audit(1529728862.071:928): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5630 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) 04:41:02 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040)) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)) 04:41:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x1c, 0x0) 04:41:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 04:41:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000000c0)}) io_setup(0x0, &(0x7f00000005c0)) ustat(0x0, &(0x7f00000000c0)) 04:41:02 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/240, 0xf0) 04:41:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) dup(0xffffffffffffffff) accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000080)=0x1c) [ 608.800974] audit: type=1326 audit(1529728862.799:929): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5648 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/240, 0xf0) 04:41:02 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040)) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)) 04:41:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) [ 608.873593] audit: type=1326 audit(1529728862.856:930): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5649 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000000c0)}) io_setup(0x0, &(0x7f00000005c0)) ustat(0x0, &(0x7f00000000c0)) 04:41:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x1c, 0x0) 04:41:03 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) iopl(0x0) 04:41:03 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/240, 0xf0) 04:41:03 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040)) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)) 04:41:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) [ 609.114806] audit: type=1326 audit(1529728863.113:931): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5680 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) dup(0xffffffffffffffff) accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000080)=0x1c) 04:41:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000000c0)}) io_setup(0x0, &(0x7f00000005c0)) ustat(0x0, &(0x7f00000000c0)) 04:41:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x1c, 0x0) 04:41:03 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/240, 0xf0) 04:41:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 04:41:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040)) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)) 04:41:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f00000000c0)=@unspec, 0xc) [ 609.768146] audit: type=1326 audit(1529728863.766:932): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5704 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:03 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/240, 0xf0) 04:41:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040)) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)) 04:41:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 04:41:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x40000000050255}]}) io_setup(0x0, &(0x7f00000005c0)) ustat(0x0, &(0x7f00000000c0)) 04:41:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x1c, 0x0) 04:41:04 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) iopl(0x0) 04:41:04 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f00000000c0)=@unspec, 0xc) 04:41:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/240, 0xf0) 04:41:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040)) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)) [ 610.181442] audit: type=1326 audit(1529728864.180:933): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5742 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x1c, 0x0) 04:41:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x40000000050255}]}) io_setup(0x0, &(0x7f00000005c0)) ustat(0x0, &(0x7f00000000c0)) 04:41:04 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 04:41:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/240, 0xf0) 04:41:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022d}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040)) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)) 04:41:04 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f00000000c0)=@unspec, 0xc) 04:41:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]}) epoll_create(0x0) quotactl(0x0, &(0x7f0000002480)='./file0/file0\x00', 0x0, &(0x7f0000001440)) 04:41:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/240, 0xf0) 04:41:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022d}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040)) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)) 04:41:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x40000000050255}]}) io_setup(0x0, &(0x7f00000005c0)) ustat(0x0, &(0x7f00000000c0)) 04:41:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x1c, 0x0) 04:41:04 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) [ 610.920896] audit: type=1326 audit(1529728864.919:934): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5770 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:05 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022d}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040)) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)) 04:41:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f00000000c0)=@unspec, 0xc) 04:41:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]}) epoll_create(0x0) quotactl(0x0, &(0x7f0000002480)='./file0/file0\x00', 0x0, &(0x7f0000001440)) 04:41:05 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6}]}) io_setup(0x0, &(0x7f00000005c0)) ustat(0x0, &(0x7f00000000c0)) 04:41:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) socket$inet_udp(0x2, 0x2, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, @remote}, &(0x7f0000000140)=0x10, 0x0) 04:41:05 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040)) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)) 04:41:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) connect$netlink(0xffffffffffffffff, &(0x7f00000000c0)=@unspec, 0xc) 04:41:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]}) epoll_create(0x0) quotactl(0x0, &(0x7f0000002480)='./file0/file0\x00', 0x0, &(0x7f0000001440)) 04:41:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) socket$inet_udp(0x2, 0x2, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, @remote}, &(0x7f0000000140)=0x10, 0x0) 04:41:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) connect$netlink(0xffffffffffffffff, &(0x7f00000000c0)=@unspec, 0xc) 04:41:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]}) epoll_create(0x0) quotactl(0x0, &(0x7f0000002480)='./file0/file0\x00', 0x0, &(0x7f0000001440)) 04:41:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/240, 0xf0) 04:41:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) socket$inet_udp(0x2, 0x2, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, @remote}, &(0x7f0000000140)=0x10, 0x0) 04:41:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) connect$netlink(0xffffffffffffffff, &(0x7f00000000c0)=@unspec, 0xc) 04:41:05 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x1c, 0x0) 04:41:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]}) quotactl(0x0, &(0x7f0000002480)='./file0/file0\x00', 0x0, &(0x7f0000001440)) 04:41:05 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) [ 611.902361] kauditd_printk_skb: 5 callbacks suppressed [ 611.902381] audit: type=1326 audit(1529728865.901:940): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5827 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]}) quotactl(0x0, &(0x7f0000002480)='./file0/file0\x00', 0x0, &(0x7f0000001440)) 04:41:05 executing program 2: openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f00000000c0)=@unspec, 0xc) [ 612.001941] audit: type=1326 audit(1529728865.966:941): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5836 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:06 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6}]}) io_setup(0x0, &(0x7f00000005c0)) ustat(0x0, &(0x7f00000000c0)) 04:41:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) socket$inet_udp(0x2, 0x2, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, @remote}, &(0x7f0000000140)=0x10, 0x0) 04:41:06 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040)) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)) 04:41:06 executing program 2: openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f00000000c0)=@unspec, 0xc) 04:41:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]}) quotactl(0x0, &(0x7f0000002480)='./file0/file0\x00', 0x0, &(0x7f0000001440)) [ 612.159811] audit: type=1326 audit(1529728866.158:942): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5848 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:06 executing program 2: openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f00000000c0)=@unspec, 0xc) [ 612.271761] audit: type=1326 audit(1529728866.270:943): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5857 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, @remote}, &(0x7f0000000140)=0x10, 0x0) 04:41:06 executing program 4: epoll_create(0x0) quotactl(0x0, &(0x7f0000002480)='./file0/file0\x00', 0x0, &(0x7f0000001440)) 04:41:06 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/240, 0xf0) 04:41:06 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f00000000c0)=@unspec, 0xc) 04:41:06 executing program 4: epoll_create(0x0) quotactl(0x0, &(0x7f0000002480)='./file0/file0\x00', 0x0, &(0x7f0000001440)) [ 612.821975] audit: type=1326 audit(1529728866.820:944): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5880 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:06 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x1c, 0x0) 04:41:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, @remote}, &(0x7f0000000140)=0x10, 0x0) 04:41:06 executing program 4: epoll_create(0x0) quotactl(0x0, &(0x7f0000002480)='./file0/file0\x00', 0x0, &(0x7f0000001440)) 04:41:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 04:41:06 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f00000000c0)=@unspec, 0xc) [ 612.939889] audit: type=1326 audit(1529728866.938:945): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5888 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 613.011147] audit: type=1326 audit(1529728866.986:946): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5893 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6}]}) io_setup(0x0, &(0x7f00000005c0)) ustat(0x0, &(0x7f00000000c0)) 04:41:07 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]}) epoll_create(0x0) quotactl(0x0, &(0x7f0000002480)='./file0/file0\x00', 0x0, &(0x7f0000001440)) 04:41:07 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040)) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)) 04:41:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, @remote}, &(0x7f0000000140)=0x10, 0x0) 04:41:07 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f00000000c0)=@unspec, 0xc) [ 613.149703] audit: type=1326 audit(1529728867.148:947): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5900 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:07 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]}) epoll_create(0x0) quotactl(0x0, &(0x7f0000002480)='./file0/file0\x00', 0x0, &(0x7f0000001440)) [ 613.233298] audit: type=1326 audit(1529728867.231:948): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5906 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f00000000c0)=@unspec, 0xc) 04:41:07 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]}) epoll_create(0x0) quotactl(0x0, &(0x7f0000002480)='./file0/file0\x00', 0x0, &(0x7f0000001440)) 04:41:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) epoll_create(0x0) quotactl(0x0, &(0x7f0000002480)='./file0/file0\x00', 0x0, &(0x7f0000001440)) 04:41:07 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, @remote}, &(0x7f0000000140)=0x10, 0x0) 04:41:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f00000000c0)=@unspec, 0xc) 04:41:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=@newtaction={0x14, 0x30}, 0x14}, 0x1}, 0x0) 04:41:07 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, @dev}, &(0x7f0000000500)=0x10, 0x0) 04:41:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f00000000c0)=@unspec, 0xc) 04:41:07 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, @remote}, &(0x7f0000000140)=0x10, 0x0) 04:41:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) epoll_create(0x0) quotactl(0x0, &(0x7f0000002480)='./file0/file0\x00', 0x0, &(0x7f0000001440)) 04:41:08 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, @remote}, &(0x7f0000000140)=0x10, 0x0) 04:41:08 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000300)=""/135) 04:41:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=@newtaction={0x14, 0x30}, 0x14}, 0x1}, 0x0) 04:41:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f00000000c0)=@unspec, 0xc) 04:41:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) epoll_create(0x0) quotactl(0x0, &(0x7f0000002480)='./file0/file0\x00', 0x0, &(0x7f0000001440)) 04:41:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x20) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, &(0x7f0000000080)) 04:41:08 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) restart_syscall() 04:41:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) 04:41:08 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) socket$inet_udp(0x2, 0x2, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, @remote}, &(0x7f0000000140)=0x10, 0x0) 04:41:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f00000000c0)=@unspec, 0xc) 04:41:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x5000c}]}) epoll_create(0x0) quotactl(0x0, &(0x7f0000002480)='./file0/file0\x00', 0x0, &(0x7f0000001440)) 04:41:08 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000300)=""/135) 04:41:08 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) socket$inet_udp(0x2, 0x2, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, @remote}, &(0x7f0000000140)=0x10, 0x0) 04:41:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=@newtaction={0x14, 0x30}, 0x14}, 0x1}, 0x0) 04:41:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 04:41:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f00000000c0)=@unspec, 0xc) 04:41:08 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) restart_syscall() 04:41:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x5000c}]}) epoll_create(0x0) quotactl(0x0, &(0x7f0000002480)='./file0/file0\x00', 0x0, &(0x7f0000001440)) 04:41:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) 04:41:08 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) socket$inet_udp(0x2, 0x2, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, @remote}, &(0x7f0000000140)=0x10, 0x0) 04:41:08 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000300)=""/135) 04:41:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 04:41:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=@newtaction={0x14, 0x30}, 0x14}, 0x1}, 0x0) 04:41:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x5000c}]}) epoll_create(0x0) quotactl(0x0, &(0x7f0000002480)='./file0/file0\x00', 0x0, &(0x7f0000001440)) 04:41:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f00000000c0)=@unspec, 0xc) 04:41:08 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) restart_syscall() 04:41:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) socket$inet_udp(0x2, 0x2, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, @remote}, &(0x7f0000000140)=0x10, 0x0) 04:41:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) [ 614.915467] audit: type=1326 audit(1529728868.914:949): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6032 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000300)=""/135) 04:41:09 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) epoll_create(0x0) quotactl(0x0, &(0x7f0000002480)='./file0/file0\x00', 0x0, &(0x7f0000001440)) 04:41:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=@newtaction={0x14, 0x30}, 0x14}, 0x1}, 0x0) 04:41:09 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) restart_syscall() 04:41:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 04:41:09 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) socket$inet_udp(0x2, 0x2, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, @remote}, &(0x7f0000000140)=0x10, 0x0) 04:41:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) 04:41:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000300)=""/135) 04:41:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=@newtaction={0x14, 0x30}, 0x14}, 0x1}, 0x0) 04:41:09 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) socket$inet_udp(0x2, 0x2, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, @remote}, &(0x7f0000000140)=0x10, 0x0) 04:41:09 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) restart_syscall() 04:41:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 04:41:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f00000000c0)=@unspec, 0xc) 04:41:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000300)=""/135) 04:41:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) 04:41:09 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) socket$inet_udp(0x2, 0x2, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, @remote}, &(0x7f0000000140)=0x10, 0x0) 04:41:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=@newtaction={0x14, 0x30}, 0x14}, 0x1}, 0x0) 04:41:10 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) socket$inet_udp(0x2, 0x2, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, @remote}, &(0x7f0000000140)=0x10, 0x0) 04:41:10 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) epoll_create(0x0) quotactl(0x0, &(0x7f0000002480)='./file0/file0\x00', 0x0, &(0x7f0000001440)) 04:41:10 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000300)=""/135) 04:41:10 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) restart_syscall() 04:41:10 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 04:41:10 executing program 1: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=@newtaction={0x14, 0x30}, 0x14}, 0x1}, 0x0) 04:41:10 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) 04:41:10 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 04:41:10 executing program 1: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=@newtaction={0x14, 0x30}, 0x14}, 0x1}, 0x0) 04:41:10 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) socket$inet_udp(0x2, 0x2, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, @remote}, &(0x7f0000000140)=0x10, 0x0) 04:41:10 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) restart_syscall() 04:41:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f00000000c0)=@unspec, 0xc) 04:41:10 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) 04:41:10 executing program 0: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000300)=""/135) 04:41:10 executing program 1: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=@newtaction={0x14, 0x30}, 0x14}, 0x1}, 0x0) 04:41:10 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 04:41:10 executing program 3: socket$inet6(0xa, 0x0, 0x0) restart_syscall() 04:41:10 executing program 6: openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 04:41:10 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) epoll_create(0x0) quotactl(0x0, &(0x7f0000002480)='./file0/file0\x00', 0x0, &(0x7f0000001440)) 04:41:10 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) socket$inet_udp(0x2, 0x2, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, @remote}, &(0x7f0000000140)=0x10, 0x0) 04:41:10 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) 04:41:10 executing program 0: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000300)=""/135) 04:41:10 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=@newtaction={0x14, 0x30}, 0x14}, 0x1}, 0x0) 04:41:10 executing program 3: socket$inet6(0xa, 0x0, 0x0) restart_syscall() [ 617.015436] kauditd_printk_skb: 4 callbacks suppressed [ 617.015467] audit: type=1326 audit(1529728871.014:954): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6160 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:11 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=@newtaction={0x14, 0x30}, 0x14}, 0x1}, 0x0) 04:41:11 executing program 6: openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 617.118924] audit: type=1326 audit(1529728871.066:955): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6166 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:11 executing program 0: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000300)=""/135) 04:41:11 executing program 7: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) 04:41:11 executing program 3: socket$inet6(0xa, 0x0, 0x0) restart_syscall() 04:41:11 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000300)=""/135) 04:41:11 executing program 6: openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 04:41:11 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=@newtaction={0x14, 0x30}, 0x14}, 0x1}, 0x0) 04:41:11 executing program 7: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) 04:41:11 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 04:41:12 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) restart_syscall() 04:41:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=@newtaction={0x14, 0x30}, 0x14}, 0x1}, 0x0) 04:41:12 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000300)=""/135) 04:41:12 executing program 7: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) 04:41:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) socket$inet_udp(0x2, 0x2, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, @remote}, &(0x7f0000000140)=0x10, 0x0) 04:41:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000080)) 04:41:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000080)) 04:41:12 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 618.059431] audit: type=1326 audit(1529728872.058:956): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6219 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=@newtaction={0x14, 0x30}, 0x14}, 0x1}, 0x0) 04:41:12 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) 04:41:12 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000300)=""/135) 04:41:12 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 04:41:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000080)) 04:41:12 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) 04:41:12 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) restart_syscall() 04:41:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000080)) 04:41:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=@newtaction={0x14, 0x30}, 0x14}, 0x1}, 0x0) 04:41:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 04:41:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000300)=""/135) 04:41:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000080)) 04:41:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) socket$inet_udp(0x2, 0x2, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, @remote}, &(0x7f0000000140)=0x10, 0x0) 04:41:12 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) 04:41:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 04:41:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=@newtaction={0x14, 0x30}, 0x14}, 0x1}, 0x0) 04:41:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000300)=""/135) 04:41:12 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) restart_syscall() 04:41:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000080)) 04:41:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000080)) 04:41:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) [ 619.037868] audit: type=1326 audit(1529728873.036:957): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6298 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:13 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000080)) 04:41:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=@newtaction={0x14, 0x30}, 0x14}, 0x1}, 0x0) 04:41:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000300)=""/135) 04:41:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 04:41:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000080)) 04:41:13 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) socket$inet6(0xa, 0x0, 0x0) restart_syscall() 04:41:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) 04:41:13 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) socket$inet6(0xa, 0x0, 0x0) restart_syscall() 04:41:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 04:41:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000300)=""/135) 04:41:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=@newtaction={0x14, 0x30}, 0x14}, 0x1}, 0x0) 04:41:13 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000080)) 04:41:13 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) 04:41:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000080)) 04:41:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) 04:41:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=@newtaction={0x14, 0x30}, 0x14}, 0x1}, 0x0) 04:41:14 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) 04:41:14 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 04:41:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000300)=""/135) 04:41:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000080)) 04:41:14 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000080)) 04:41:14 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) socket$inet6(0xa, 0x0, 0x0) restart_syscall() [ 620.215097] audit: type=1326 audit(1529728874.213:958): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6361 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:14 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) 04:41:14 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 04:41:14 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) 04:41:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000300)=""/135) 04:41:14 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000080)) 04:41:14 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) restart_syscall() 04:41:14 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000080)) 04:41:14 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 04:41:14 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) [ 620.682164] audit: type=1326 audit(1529728874.680:959): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6406 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=@newtaction={0x14, 0x30}, 0x14}, 0x1}, 0x0) 04:41:15 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000300)=""/135) 04:41:15 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) 04:41:15 executing program 4: openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000080)) 04:41:15 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000080)) 04:41:15 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) restart_syscall() 04:41:15 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) [ 621.141727] audit: type=1326 audit(1529728875.140:960): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6415 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:15 executing program 4: openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000080)) 04:41:15 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000080)) [ 621.200627] audit: type=1326 audit(1529728875.188:961): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6427 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:15 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) 04:41:15 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) [ 621.329519] audit: type=1326 audit(1529728875.328:962): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6438 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:15 executing program 4: openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000080)) 04:41:15 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) restart_syscall() 04:41:15 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000080)) 04:41:15 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 04:41:15 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) [ 621.655111] audit: type=1326 audit(1529728875.653:963): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6462 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:16 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000080)) 04:41:16 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) 04:41:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=@newtaction={0x14, 0x30}, 0x14}, 0x1}, 0x0) 04:41:16 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000080)) 04:41:16 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000300)=""/135) 04:41:16 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) restart_syscall() [ 622.127330] audit: type=1326 audit(1529728876.123:964): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6471 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:16 executing program 5: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) 04:41:16 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000080)) [ 622.182316] audit: type=1326 audit(1529728876.154:965): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6478 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 622.202139] audit: type=1326 audit(1529728876.166:966): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6468 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:16 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000080)) 04:41:16 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) 04:41:16 executing program 5: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) 04:41:16 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000080)) 04:41:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000080)) [ 622.373256] audit: type=1326 audit(1529728876.371:967): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6492 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000080)) 04:41:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 04:41:16 executing program 5: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) 04:41:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000080)) [ 622.657571] audit: type=1326 audit(1529728876.656:968): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6515 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000300)=""/135) 04:41:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000080)) 04:41:17 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) 04:41:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000080)) 04:41:17 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) restart_syscall() 04:41:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) setresgid(0x0, 0x0, 0x0) [ 623.125669] audit: type=1326 audit(1529728877.124:969): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6526 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:17 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) 04:41:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000080)) [ 623.185842] audit: type=1326 audit(1529728877.167:970): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6529 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:17 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) 04:41:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000080)) 04:41:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 04:41:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000080)) 04:41:17 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) [ 623.370899] audit: type=1326 audit(1529728877.360:971): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6549 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:17 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) 04:41:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000080)) 04:41:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000080)) 04:41:18 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) restart_syscall() 04:41:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 04:41:18 executing program 6: seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x12000050180}]}) seccomp(0x0, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000000c0)) 04:41:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000080)) 04:41:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) 04:41:18 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000080)) 04:41:18 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) socket$inet_udp(0x2, 0x2, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) [ 624.093184] audit: type=1326 audit(1529728878.091:972): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6578 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:18 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000080)) [ 624.156163] audit: type=1326 audit(1529728878.125:973): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6579 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 04:41:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) 04:41:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:41:18 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000080)) 04:41:18 executing program 6: seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x12000050180}]}) seccomp(0x0, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000000c0)) 04:41:18 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) setresuid(0x0, 0x0, 0x0) 04:41:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022d}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) 04:41:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) setresgid(0x0, 0x0, 0x0) 04:41:19 executing program 6: seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x12000050180}]}) seccomp(0x0, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000000c0)) 04:41:19 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:41:19 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022d}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) 04:41:19 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) setresuid(0x0, 0x0, 0x0) 04:41:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) setresgid(0x0, 0x0, 0x0) 04:41:19 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)=@known='security.ima\x00', &(0x7f0000000300)=""/248, 0xf8) 04:41:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000080)) 04:41:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) setresgid(0x0, 0x0, 0x0) 04:41:19 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022d}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) 04:41:19 executing program 6: seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x12000050180}]}) seccomp(0x0, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000000c0)) 04:41:19 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:41:19 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000080)) 04:41:19 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) setresuid(0x0, 0x0, 0x0) 04:41:19 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)=@known='security.ima\x00', &(0x7f0000000300)=""/248, 0xf8) 04:41:19 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) 04:41:19 executing program 1: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 04:41:19 executing program 6: seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x12000050180}]}) timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000000c0)) 04:41:19 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:41:19 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) setresuid(0x0, 0x0, 0x0) 04:41:19 executing program 1: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 04:41:19 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)=@known='security.ima\x00', &(0x7f0000000300)=""/248, 0xf8) 04:41:19 executing program 6: seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x12000050180}]}) timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000000c0)) 04:41:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000080)) 04:41:19 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) setresuid(0x0, 0x0, 0x0) 04:41:19 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:41:19 executing program 1: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 04:41:19 executing program 6: seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x12000050180}]}) timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000000c0)) 04:41:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000080)) 04:41:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)=@known='security.ima\x00', &(0x7f0000000300)=""/248, 0xf8) 04:41:20 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 04:41:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) setresuid(0x0, 0x0, 0x0) 04:41:20 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) 04:41:20 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000000c0)) 04:41:20 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:41:20 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 04:41:20 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000000c0)) 04:41:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)=@known='security.ima\x00', &(0x7f0000000300)=""/248, 0xf8) 04:41:20 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:41:20 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 04:41:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) setresuid(0x0, 0x0, 0x0) 04:41:20 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000000c0)) 04:41:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)=@known='security.ima\x00', &(0x7f0000000300)=""/248, 0xf8) 04:41:20 executing program 7: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:41:21 executing program 7: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:41:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000180), 0x4) 04:41:21 executing program 6: seccomp(0x0, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x12000050180}]}) seccomp(0x0, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000000c0)) 04:41:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)=@known='security.ima\x00', &(0x7f0000000300)=""/248, 0xf8) 04:41:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) 04:41:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 04:41:21 executing program 0: write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) setresuid(0x0, 0x0, 0x0) 04:41:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080), 0x4) 04:41:21 executing program 6: seccomp(0x0, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x12000050180}]}) seccomp(0x0, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000000c0)) 04:41:21 executing program 7: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:41:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000180), 0x4) 04:41:21 executing program 3: write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)=@known='security.ima\x00', &(0x7f0000000300)=""/248, 0xf8) 04:41:21 executing program 6: seccomp(0x0, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x12000050180}]}) seccomp(0x0, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000000c0)) [ 627.500197] kauditd_printk_skb: 7 callbacks suppressed [ 627.500221] audit: type=1326 audit(1529728881.498:981): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6794 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:21 executing program 0: write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) setresuid(0x0, 0x0, 0x0) 04:41:21 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:41:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 04:41:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080), 0x4) 04:41:21 executing program 3: write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)=@known='security.ima\x00', &(0x7f0000000300)=""/248, 0xf8) 04:41:21 executing program 6: seccomp(0x1, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000040)}) seccomp(0x0, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000000c0)) 04:41:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000180), 0x4) 04:41:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 04:41:22 executing program 0: write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) setresuid(0x0, 0x0, 0x0) 04:41:22 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:41:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080), 0x4) 04:41:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000180), 0x4) 04:41:22 executing program 3: write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)=@known='security.ima\x00', &(0x7f0000000300)=""/248, 0xf8) 04:41:22 executing program 6: seccomp(0x1, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000040)}) seccomp(0x0, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000000c0)) 04:41:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000600)='/dev/hwrng\x00', 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) 04:41:22 executing program 6: seccomp(0x1, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000040)}) seccomp(0x0, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000000c0)) 04:41:22 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) setresuid(0x0, 0x0, 0x0) 04:41:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 04:41:22 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)=@known='security.ima\x00', &(0x7f0000000300)=""/248, 0xf8) 04:41:22 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:41:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000600)='/dev/hwrng\x00', 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) 04:41:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000180), 0x4) 04:41:22 executing program 6: seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x12000050180}]}) seccomp(0x0, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000000c0)) 04:41:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080), 0x4) 04:41:22 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) setresuid(0x0, 0x0, 0x0) 04:41:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 04:41:22 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:41:22 executing program 6: seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x12000050180}]}) seccomp(0x0, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000000c0)) 04:41:22 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)=@known='security.ima\x00', &(0x7f0000000300)=""/248, 0xf8) 04:41:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000180), 0x4) 04:41:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000600)='/dev/hwrng\x00', 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) 04:41:23 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) setresuid(0x0, 0x0, 0x0) 04:41:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:41:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 04:41:23 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080), 0x4) 04:41:23 executing program 6: seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x12000050180}]}) seccomp(0x0, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000000c0)) 04:41:23 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)=@known='security.ima\x00', &(0x7f0000000300)=""/248, 0xf8) 04:41:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000180), 0x4) 04:41:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000300)=""/249) 04:41:23 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) setresuid(0x0, 0x0, 0x0) 04:41:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 04:41:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:41:23 executing program 6: seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000040)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000000c0)) 04:41:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)=@known='security.ima\x00', &(0x7f0000000300)=""/248, 0xf8) 04:41:23 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080), 0x4) [ 629.392567] audit: type=1326 audit(1529728883.391:982): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6928 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:23 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000180), 0x4) 04:41:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 629.499240] audit: type=1326 audit(1529728883.457:983): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6933 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:23 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) setresuid(0x0, 0x0, 0x0) 04:41:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000300)=""/249) 04:41:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)=@known='security.ima\x00', &(0x7f0000000300)=""/248, 0xf8) 04:41:23 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080), 0x4) 04:41:23 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000180), 0x4) 04:41:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:41:23 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) setresuid(0x0, 0x0, 0x0) 04:41:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)=@known='security.ima\x00', &(0x7f0000000300)=""/248, 0xf8) 04:41:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000300)=""/249) 04:41:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 04:41:24 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000180), 0x4) 04:41:24 executing program 4: creat(&(0x7f0000000040)='./file0\x00', 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080), 0x4) 04:41:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:41:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) setresuid(0x0, 0x0, 0x0) 04:41:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)=@known='security.ima\x00', &(0x7f0000000300)=""/248, 0xf8) 04:41:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000300)=""/249) 04:41:24 executing program 6: seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000040)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000000c0)) [ 630.390318] audit: type=1326 audit(1529728884.389:984): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6985 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:24 executing program 4: creat(&(0x7f0000000040)='./file0\x00', 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080), 0x4) 04:41:24 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000180), 0x4) 04:41:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:41:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000300)=""/249) [ 630.471166] audit: type=1326 audit(1529728884.410:985): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6996 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) setresuid(0x0, 0x0, 0x0) 04:41:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)=@known='security.ima\x00', &(0x7f0000000300)=""/248, 0xf8) 04:41:24 executing program 4: creat(&(0x7f0000000040)='./file0\x00', 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080), 0x4) [ 630.613114] audit: type=1326 audit(1529728884.611:986): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7010 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:24 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000180), 0x4) 04:41:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 04:41:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000300)=""/249) 04:41:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) setresuid(0x0, 0x0, 0x0) 04:41:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)=@known='security.ima\x00', &(0x7f0000000300)=""/248, 0xf8) 04:41:25 executing program 6: seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000040)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000000c0)) 04:41:25 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080), 0x4) 04:41:25 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000180), 0x4) [ 631.354405] audit: type=1326 audit(1529728885.350:987): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7035 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)=@known='security.ima\x00', &(0x7f0000000300)=""/248, 0xf8) 04:41:25 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080), 0x4) 04:41:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) setresuid(0x0, 0x0, 0x0) [ 631.441108] audit: type=1326 audit(1529728885.421:988): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7038 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000180), 0x4) 04:41:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:41:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000300)=""/249) [ 631.552621] audit: type=1326 audit(1529728885.500:989): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7053 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 631.572507] audit: type=1326 audit(1529728885.527:990): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7056 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:25 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080), 0x4) 04:41:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000180), 0x4) 04:41:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) creat(&(0x7f0000000040)='./file0\x00', 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080), 0x4) 04:41:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) keyctl$search(0xa, 0x0, &(0x7f0000000080)='cifs.idmap\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0) 04:41:26 executing program 5: socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000300)=""/249) 04:41:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) creat(&(0x7f0000000040)='./file0\x00', 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080), 0x4) 04:41:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000180), 0x4) 04:41:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) pipe(&(0x7f0000000400)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)={0x0, @dev, @rand_addr}, &(0x7f0000000140)=0xc) 04:41:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) creat(&(0x7f0000000040)='./file0\x00', 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080), 0x4) 04:41:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000180), 0x4) 04:41:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)=@known='security.ima\x00', &(0x7f0000000300)=""/248, 0xf8) 04:41:26 executing program 5: socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000300)=""/249) 04:41:26 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) setresuid(0x0, 0x0, 0x0) 04:41:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080), 0x4) [ 632.571675] kauditd_printk_skb: 1 callbacks suppressed [ 632.571697] audit: type=1326 audit(1529728886.570:992): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7111 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:41:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) keyctl$search(0xa, 0x0, &(0x7f0000000080)='cifs.idmap\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0) 04:41:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000300)=""/156, &(0x7f0000000140)=0x9c) 04:41:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000180), 0x4) 04:41:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080), 0x4) 04:41:26 executing program 5: socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000300)=""/249) [ 632.714505] audit: type=1326 audit(1529728886.626:993): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7113 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 632.734395] audit: type=1326 audit(1529728886.708:994): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7127 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080), 0x4) 04:41:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000180), 0x4) 04:41:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) keyctl$search(0xa, 0x0, &(0x7f0000000080)='cifs.idmap\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0) 04:41:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000300)=""/156, &(0x7f0000000140)=0x9c) 04:41:26 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000300)=""/249) 04:41:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080), 0x4) [ 633.066596] audit: type=1326 audit(1529728887.065:995): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7155 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)=@known='security.ima\x00', &(0x7f0000000300)=""/248, 0xf8) 04:41:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000180), 0x4) 04:41:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) keyctl$search(0xa, 0x0, &(0x7f0000000080)='cifs.idmap\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0) 04:41:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000300)=""/156, &(0x7f0000000140)=0x9c) [ 633.550709] audit: type=1326 audit(1529728887.549:996): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7166 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 633.578010] audit: type=1326 audit(1529728887.576:997): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7172 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) keyctl$search(0xa, 0x0, &(0x7f0000000080)='cifs.idmap\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0) 04:41:27 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000300)=""/249) 04:41:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) setresuid(0x0, 0x0, 0x0) 04:41:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000300)=""/156, &(0x7f0000000140)=0x9c) [ 633.682216] audit: type=1326 audit(1529728887.680:998): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7174 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:27 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000300)=""/249) 04:41:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) keyctl$search(0xa, 0x0, &(0x7f0000000080)='cifs.idmap\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0) 04:41:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000300)=""/156, &(0x7f0000000140)=0x9c) 04:41:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) keyctl$search(0xa, 0x0, &(0x7f0000000080)='cifs.idmap\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0) 04:41:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000300)=""/249) 04:41:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080), 0x4) 04:41:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000300)=""/156, &(0x7f0000000140)=0x9c) 04:41:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000300)=""/249) [ 634.100390] audit: type=1326 audit(1529728888.099:999): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7207 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000180), 0x4) 04:41:28 executing program 6: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) keyctl$search(0xa, 0x0, &(0x7f0000000080)='cifs.idmap\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0) 04:41:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000300)=""/249) 04:41:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000300)=""/156, &(0x7f0000000140)=0x9c) 04:41:28 executing program 6: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) keyctl$search(0xa, 0x0, &(0x7f0000000080)='cifs.idmap\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0) [ 634.528579] audit: type=1326 audit(1529728888.527:1000): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7227 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000300)=""/249) 04:41:28 executing program 1: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000300)=""/156, &(0x7f0000000140)=0x9c) 04:41:28 executing program 6: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) keyctl$search(0xa, 0x0, &(0x7f0000000080)='cifs.idmap\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0) 04:41:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000300)=""/249) 04:41:28 executing program 1: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000300)=""/156, &(0x7f0000000140)=0x9c) 04:41:28 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) keyctl$search(0xa, 0x0, &(0x7f0000000080)='cifs.idmap\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0) 04:41:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000300)=""/249) 04:41:28 executing program 1: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000300)=""/156, &(0x7f0000000140)=0x9c) 04:41:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080), 0x4) 04:41:29 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) keyctl$search(0xa, 0x0, &(0x7f0000000080)='cifs.idmap\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0) 04:41:29 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000300)=""/156, &(0x7f0000000140)=0x9c) [ 635.027266] audit: type=1326 audit(1529728889.025:1001): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7268 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:29 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000180), 0x4) 04:41:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000300)=""/249) 04:41:29 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000300)=""/156, &(0x7f0000000140)=0x9c) 04:41:29 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) keyctl$search(0xa, 0x0, &(0x7f0000000080)='cifs.idmap\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0) 04:41:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) ustat(0x0, &(0x7f0000000100)) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 04:41:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f00000001c0)=@delsa={0x28, 0x11, 0x0, 0x0, 0x0, {@in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0x28}, 0x1}, 0x0) 04:41:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000)) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) 04:41:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) keyctl$search(0xa, 0x0, &(0x7f0000000080)='cifs.idmap\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0) 04:41:29 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000300)=""/156, &(0x7f0000000140)=0x9c) 04:41:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f00000001c0)=@delsa={0x28, 0x11, 0x0, 0x0, 0x0, {@in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0x28}, 0x1}, 0x0) 04:41:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000)) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) 04:41:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) ustat(0x0, &(0x7f0000000100)) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 04:41:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000300)=""/156, &(0x7f0000000140)=0x9c) 04:41:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f00000001c0)=@delsa={0x28, 0x11, 0x0, 0x0, 0x0, {@in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0x28}, 0x1}, 0x0) 04:41:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) keyctl$search(0xa, 0x0, &(0x7f0000000080)='cifs.idmap\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0) 04:41:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) ustat(0x0, &(0x7f0000000100)) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 04:41:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000300)=""/249) 04:41:30 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000300)=""/156, &(0x7f0000000140)=0x9c) 04:41:30 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000)) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) 04:41:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000240), 0x0) 04:41:30 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) keyctl$search(0xa, 0x0, &(0x7f0000000080)='cifs.idmap\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0) 04:41:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f00000001c0)=@delsa={0x28, 0x11, 0x0, 0x0, 0x0, {@in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0x28}, 0x1}, 0x0) 04:41:30 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50193}]}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)}) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0)) 04:41:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) ustat(0x0, &(0x7f0000000100)) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 04:41:30 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000300)=""/156, &(0x7f0000000140)=0x9c) 04:41:30 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) keyctl$search(0xa, 0x0, &(0x7f0000000080)='cifs.idmap\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0) 04:41:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140)) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080)) 04:41:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f00000001c0)=@delsa={0x28, 0x11, 0x0, 0x0, 0x0, {@in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0x28}, 0x1}, 0x0) 04:41:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 04:41:30 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50193}]}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)}) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0)) 04:41:30 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000)) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) 04:41:30 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000300)=""/156, &(0x7f0000000140)=0x9c) 04:41:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 04:41:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140)) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080)) 04:41:31 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) keyctl$search(0xa, 0x0, &(0x7f0000000080)='cifs.idmap\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0) 04:41:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000300)=""/156, &(0x7f0000000140)=0x9c) 04:41:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f00000001c0)=@delsa={0x28, 0x11, 0x0, 0x0, 0x0, {@in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0x28}, 0x1}, 0x0) 04:41:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000300)=""/249) 04:41:31 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) 04:41:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50193}]}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)}) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0)) 04:41:31 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) keyctl$search(0xa, 0x0, &(0x7f0000000080)='cifs.idmap\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0) 04:41:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000300)=""/156, &(0x7f0000000140)=0x9c) 04:41:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f00000001c0)=@delsa={0x28, 0x11, 0x0, 0x0, 0x0, {@in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0x28}, 0x1}, 0x0) 04:41:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 04:41:31 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) 04:41:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50193}]}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)}) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0)) 04:41:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140)) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080)) 04:41:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000300)=""/156, &(0x7f0000000140)=0x9c) 04:41:31 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) keyctl$search(0xa, 0x0, &(0x7f0000000080)='cifs.idmap\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0) [ 637.763452] kauditd_printk_skb: 4 callbacks suppressed [ 637.763481] audit: type=1326 audit(1529728891.762:1007): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7422 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 637.851477] audit: type=1326 audit(1529728891.757:1006): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7421 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:32 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) 04:41:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140)) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080)) 04:41:32 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f00000001c0)=@delsa={0x28, 0x11, 0x0, 0x0, 0x0, {@in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0x28}, 0x1}, 0x0) 04:41:32 executing program 7: ustat(0x0, &(0x7f0000000100)) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 04:41:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50193}]}) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0)) 04:41:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000400)) 04:41:32 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f00000001c0)=@delsa={0x28, 0x11, 0x0, 0x0, 0x0, {@in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0x28}, 0x1}, 0x0) 04:41:32 executing program 7: ustat(0x0, &(0x7f0000000100)) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 04:41:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000400)) 04:41:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50193}]}) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0)) 04:41:32 executing program 0: socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000)) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) 04:41:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080)) 04:41:32 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f00000001c0)=@delsa={0x28, 0x11, 0x0, 0x0, 0x0, {@in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0x28}, 0x1}, 0x0) 04:41:32 executing program 7: ustat(0x0, &(0x7f0000000100)) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 04:41:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000300)=""/156, &(0x7f0000000140)=0x9c) 04:41:32 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) keyctl$search(0xa, 0x0, &(0x7f0000000080)='cifs.idmap\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0) 04:41:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50193}]}) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0)) 04:41:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000400)) 04:41:32 executing program 0: socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000)) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) [ 638.818038] audit: type=1326 audit(1529728892.816:1008): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7472 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:32 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) ustat(0x0, &(0x7f0000000100)) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 04:41:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080)) 04:41:32 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f00000001c0)=@delsa={0x28, 0x11, 0x0, 0x0, 0x0, {@in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0x28}, 0x1}, 0x0) [ 638.928334] audit: type=1326 audit(1529728892.883:1009): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7475 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:33 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)}) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0)) 04:41:33 executing program 0: socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000)) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) 04:41:33 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000400)) 04:41:33 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) ustat(0x0, &(0x7f0000000100)) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 04:41:33 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f00000001c0)=@delsa={0x28, 0x11, 0x0, 0x0, 0x0, {@in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0x28}, 0x1}, 0x0) 04:41:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080)) 04:41:33 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000)) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) 04:41:33 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)}) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0)) 04:41:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000300)=""/156, &(0x7f0000000140)=0x9c) 04:41:33 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) ustat(0x0, &(0x7f0000000100)) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 04:41:33 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000400)) 04:41:33 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000)) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) 04:41:33 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f00000001c0)=@delsa={0x28, 0x11, 0x0, 0x0, 0x0, {@in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0x28}, 0x1}, 0x0) 04:41:33 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)}) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0)) 04:41:33 executing program 4: ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140)) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080)) 04:41:33 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) keyctl$search(0xa, 0x0, &(0x7f0000000080)='cifs.idmap\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0) [ 639.786137] audit: type=1326 audit(1529728893.784:1010): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7528 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:33 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000300)}) ustat(0x0, &(0x7f0000000100)) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 04:41:33 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f00000001c0)=@delsa={0x28, 0x11, 0x0, 0x0, 0x0, {@in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0x28}, 0x1}, 0x0) [ 639.843928] audit: type=1326 audit(1529728893.831:1011): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7540 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:33 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000)) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) 04:41:33 executing program 4: ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140)) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080)) 04:41:33 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50193}]}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)}) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0)) 04:41:33 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000400)) 04:41:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000300)}) ustat(0x0, &(0x7f0000000100)) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 04:41:34 executing program 4: ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140)) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080)) 04:41:34 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6) 04:41:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000)) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) 04:41:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f00000001c0)=@delsa={0x28, 0x11, 0x0, 0x0, 0x0, {@in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0x28}, 0x1}, 0x0) 04:41:34 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50193}]}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)}) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0)) 04:41:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000400)) 04:41:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000300)}) ustat(0x0, &(0x7f0000000100)) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 04:41:34 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140)) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080)) 04:41:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000)) 04:41:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000)) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) 04:41:34 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140)) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080)) 04:41:34 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50193}]}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)}) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0)) 04:41:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x50355}]}) ustat(0x0, &(0x7f0000000100)) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 04:41:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f00000001c0)=@delsa={0x28, 0x11, 0x0, 0x0, 0x0, {@in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0x28}, 0x1}, 0x0) 04:41:34 executing program 5: shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000400)) 04:41:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6) 04:41:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000)) 04:41:35 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140)) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080)) 04:41:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000)) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) 04:41:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)}) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0)) 04:41:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f00000001c0)=@delsa={0x28, 0x11, 0x0, 0x0, 0x0, {@in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0x28}, 0x1}, 0x0) 04:41:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x50355}]}) ustat(0x0, &(0x7f0000000100)) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 04:41:35 executing program 5: shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000400)) 04:41:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6) 04:41:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000)) 04:41:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)}) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0)) 04:41:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140)) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080)) 04:41:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000)) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) 04:41:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x50355}]}) ustat(0x0, &(0x7f0000000100)) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 04:41:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f00000001c0)=@delsa={0x28, 0x11, 0x0, 0x0, 0x0, {@in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0x28}, 0x1}, 0x0) 04:41:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140)) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080)) 04:41:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000)) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) 04:41:35 executing program 5: shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000400)) 04:41:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)}) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0)) 04:41:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6}]}) ustat(0x0, &(0x7f0000000100)) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 04:41:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f00000001c0)=@delsa={0x28, 0x11, 0x0, 0x0, 0x0, {@in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0x28}, 0x1}, 0x0) 04:41:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000)) 04:41:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6) [ 641.734568] audit: type=1326 audit(1529728895.733:1012): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7671 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140)) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080)) 04:41:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50193}]}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)}) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0)) 04:41:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000)) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) 04:41:35 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000400)) 04:41:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f00000001c0)=@delsa={0x28, 0x11, 0x0, 0x0, 0x0, {@in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0x28}, 0x1}, 0x0) 04:41:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000)) 04:41:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6) 04:41:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50193}]}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)}) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0)) 04:41:36 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000)) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) 04:41:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022d}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140)) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080)) [ 642.027117] audit: type=1326 audit(1529728896.025:1013): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7696 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:36 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000400)) [ 642.142767] audit: type=1326 audit(1529728896.141:1014): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7705 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50193}]}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)}) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0)) 04:41:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6}]}) ustat(0x0, &(0x7f0000000100)) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 04:41:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6) 04:41:36 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000400)) 04:41:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022d}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140)) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080)) 04:41:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000)) 04:41:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)}) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0)) [ 642.656171] audit: type=1326 audit(1529728896.654:1015): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7725 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022d}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140)) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080)) 04:41:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000400)) 04:41:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f00000001c0)=@delsa={0x28, 0x11, 0x0, 0x0, 0x0, {@in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0x28}, 0x1}, 0x0) 04:41:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000)) 04:41:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6) 04:41:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140)) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080)) [ 642.946750] kauditd_printk_skb: 1 callbacks suppressed [ 642.946803] audit: type=1326 audit(1529728896.945:1017): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7752 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:37 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000)) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) 04:41:37 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000400)) 04:41:37 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000)) 04:41:37 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6) [ 643.014267] audit: type=1326 audit(1529728896.988:1018): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7756 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 643.132774] audit: type=1326 audit(1529728897.131:1019): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7768 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:37 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6}]}) ustat(0x0, &(0x7f0000000100)) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 04:41:37 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000)) 04:41:37 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000400)) 04:41:37 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6) 04:41:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)}) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0)) 04:41:37 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000400)) [ 643.645297] audit: type=1326 audit(1529728897.643:1020): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7778 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:37 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6) 04:41:37 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000)) [ 643.708153] audit: type=1326 audit(1529728897.684:1021): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7785 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:37 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f00000001c0)=@delsa={0x28, 0x11, 0x0, 0x0, 0x0, {@in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0x28}, 0x1}, 0x0) 04:41:37 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000400)) 04:41:37 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6) 04:41:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140)) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080)) [ 643.954482] audit: type=1326 audit(1529728897.953:1022): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7803 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 644.001289] audit: type=1326 audit(1529728897.995:1023): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7810 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000)) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) 04:41:38 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000)) 04:41:38 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6) 04:41:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000400)) [ 644.131542] audit: type=1326 audit(1529728898.130:1024): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7821 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)}) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0)) 04:41:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000400)) 04:41:38 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000)) 04:41:38 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6) 04:41:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) memfd_create(&(0x7f0000000080)='\x00', 0x0) tgkill(0x0, 0x0, 0x0) [ 644.625547] audit: type=1326 audit(1529728898.623:1025): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7831 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6) 04:41:38 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000)) [ 644.674456] audit: type=1326 audit(1529728898.671:1026): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7834 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6) 04:41:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6) 04:41:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) memfd_create(&(0x7f0000000080)='\x00', 0x0) tgkill(0x0, 0x0, 0x0) 04:41:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000)) 04:41:38 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140)) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080)) 04:41:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) memfd_create(&(0x7f0000000080)='\x00', 0x0) tgkill(0x0, 0x0, 0x0) 04:41:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) unshare(0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000001440)) 04:41:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000)) 04:41:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6) 04:41:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000400)) 04:41:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) 04:41:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6) 04:41:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000)) 04:41:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) memfd_create(&(0x7f0000000080)='\x00', 0x0) tgkill(0x0, 0x0, 0x0) 04:41:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 04:41:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) unshare(0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000001440)) 04:41:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000)) 04:41:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6) 04:41:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) unshare(0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000001440)) 04:41:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) tgkill(0x0, 0x0, 0x0) 04:41:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 04:41:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) 04:41:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000)) 04:41:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6) 04:41:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) pipe(&(0x7f0000000000)) 04:41:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000)) 04:41:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000400)) 04:41:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 04:41:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) unshare(0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000001440)) 04:41:40 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) 04:41:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) pipe(&(0x7f0000000000)) 04:41:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) tgkill(0x0, 0x0, 0x0) 04:41:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000)) 04:41:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) tgkill(0x0, 0x0, 0x0) 04:41:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 04:41:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000001440)) 04:41:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) pipe(&(0x7f0000000000)) 04:41:40 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x0) 04:41:40 executing program 7: memfd_create(&(0x7f0000000080)='\x00', 0x0) tgkill(0x0, 0x0, 0x0) 04:41:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6) 04:41:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) fcntl$getown(0xffffffffffffffff, 0x9) 04:41:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000001440)) 04:41:41 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000001440)) 04:41:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) pipe(&(0x7f0000000000)) 04:41:41 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x0) 04:41:41 executing program 7: memfd_create(&(0x7f0000000080)='\x00', 0x0) tgkill(0x0, 0x0, 0x0) 04:41:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) fcntl$getown(0xffffffffffffffff, 0x9) 04:41:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) 04:41:41 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000)) 04:41:41 executing program 7: memfd_create(&(0x7f0000000080)='\x00', 0x0) tgkill(0x0, 0x0, 0x0) 04:41:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) pipe(&(0x7f0000000000)) 04:41:41 executing program 3: unshare(0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000001440)) 04:41:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) fcntl$getown(0xffffffffffffffff, 0x9) 04:41:41 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x0) 04:41:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) 04:41:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6) 04:41:41 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) memfd_create(&(0x7f0000000080)='\x00', 0x0) tgkill(0x0, 0x0, 0x0) 04:41:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) pipe(&(0x7f0000000000)) 04:41:41 executing program 3: unshare(0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000001440)) 04:41:41 executing program 2: pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 04:41:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) 04:41:41 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x0) 04:41:42 executing program 3: unshare(0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000001440)) 04:41:42 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) memfd_create(&(0x7f0000000080)='\x00', 0x0) tgkill(0x0, 0x0, 0x0) [ 648.049021] kauditd_printk_skb: 7 callbacks suppressed [ 648.055419] audit: type=1326 audit(1529728902.042:1034): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8045 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:42 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000)) 04:41:42 executing program 2: pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 04:41:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) pipe(&(0x7f0000000000)) 04:41:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) 04:41:42 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x0) 04:41:42 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) unshare(0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000001440)) 04:41:42 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) memfd_create(&(0x7f0000000080)='\x00', 0x0) tgkill(0x0, 0x0, 0x0) [ 648.667037] audit: type=1326 audit(1529728902.665:1035): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8061 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:42 executing program 2: pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 04:41:42 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) memfd_create(&(0x7f0000000080)='\x00', 0x0) tgkill(0x0, 0x0, 0x0) 04:41:42 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) unshare(0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000001440)) 04:41:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) 04:41:42 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x0) 04:41:42 executing program 4: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) pipe(&(0x7f0000000000)) 04:41:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) dup(0xffffffffffffffff) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xc) 04:41:43 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 04:41:43 executing program 4: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) pipe(&(0x7f0000000000)) 04:41:43 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 04:41:43 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) unshare(0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000001440)) 04:41:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) memfd_create(&(0x7f0000000080)='\x00', 0x0) tgkill(0x0, 0x0, 0x0) 04:41:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) 04:41:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x0) 04:41:43 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000100)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000001c0)) 04:41:43 executing program 4: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) pipe(&(0x7f0000000000)) 04:41:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000080)=0x1e) 04:41:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000300)}) unshare(0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000001440)) 04:41:43 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 04:41:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) memfd_create(&(0x7f0000000080)='\x00', 0x0) tgkill(0x0, 0x0, 0x0) 04:41:43 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) pipe(&(0x7f0000000000)) 04:41:43 executing program 0: openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x0) 04:41:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) 04:41:43 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in=@rand_addr}}, 0xe8) 04:41:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000080)=0x1e) 04:41:43 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) pipe(&(0x7f0000000000)) 04:41:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000300)}) unshare(0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000001440)) 04:41:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) memfd_create(&(0x7f0000000080)='\x00', 0x0) tgkill(0x0, 0x0, 0x0) 04:41:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 04:41:44 executing program 0: openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x0) 04:41:44 executing program 5: write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) 04:41:44 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) pipe(&(0x7f0000000000)) 04:41:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000300)}) unshare(0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000001440)) 04:41:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000080)=0x1e) 04:41:44 executing program 5: write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) 04:41:44 executing program 0: openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x0) 04:41:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) memfd_create(&(0x7f0000000080)='\x00', 0x0) tgkill(0x0, 0x0, 0x0) 04:41:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 04:41:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in=@rand_addr}}, 0xe8) 04:41:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) pipe(&(0x7f0000000000)) 04:41:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x50355}]}) unshare(0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000001440)) 04:41:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000080)=0x1e) 04:41:44 executing program 5: write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) 04:41:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) memfd_create(&(0x7f0000000080)='\x00', 0x0) tgkill(0x0, 0x0, 0x0) 04:41:44 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x0) 04:41:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 04:41:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in=@rand_addr}}, 0xe8) 04:41:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x50355}]}) unshare(0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000001440)) 04:41:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) pipe(&(0x7f0000000000)) 04:41:44 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x0) 04:41:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) memfd_create(&(0x7f0000000080)='\x00', 0x0) tgkill(0x0, 0x0, 0x0) 04:41:44 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) 04:41:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000080)=0x1e) 04:41:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 04:41:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x50355}]}) unshare(0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000001440)) [ 650.874995] audit: type=1326 audit(1529728904.873:1036): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8232 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) pipe(&(0x7f0000000000)) 04:41:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in=@rand_addr}}, 0xe8) 04:41:45 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x0) 04:41:45 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) 04:41:45 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 04:41:45 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000080)=0x1e) 04:41:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6}]}) unshare(0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000001440)) 04:41:45 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) pipe(&(0x7f0000000000)) 04:41:45 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) [ 651.208844] audit: type=1326 audit(1529728905.207:1037): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8265 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x0) 04:41:45 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 04:41:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) memfd_create(&(0x7f0000000080)='\x00', 0x0) tgkill(0x0, 0x0, 0x0) 04:41:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in=@rand_addr}}, 0xe8) 04:41:45 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000080)=0x1e) 04:41:45 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) pipe(&(0x7f0000000000)) 04:41:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x0) 04:41:45 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 04:41:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) [ 651.803136] audit: type=1326 audit(1529728905.801:1038): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8289 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) 04:41:45 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) pipe(&(0x7f0000000000)) [ 651.870298] audit: type=1326 audit(1529728905.847:1039): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8299 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x0) 04:41:45 executing program 1: shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000080)=0x1e) 04:41:46 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6}]}) unshare(0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000001440)) 04:41:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in=@rand_addr}}, 0xe8) 04:41:46 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) pipe(&(0x7f0000000000)) 04:41:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) 04:41:46 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022d}]}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x0) [ 652.164880] audit: type=1326 audit(1529728906.163:1040): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8320 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 652.233373] audit: type=1326 audit(1529728906.231:1041): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8328 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) memfd_create(&(0x7f0000000080)='\x00', 0x0) tgkill(0x0, 0x0, 0x0) 04:41:46 executing program 1: shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000080)=0x1e) 04:41:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) 04:41:46 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022d}]}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x0) 04:41:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in=@rand_addr}}, 0xe8) 04:41:46 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) [ 652.764484] audit: type=1326 audit(1529728906.763:1042): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8336 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:46 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022d}]}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x0) 04:41:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) [ 652.828728] audit: type=1326 audit(1529728906.811:1043): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8344 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:46 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in=@rand_addr}}, 0xe8) 04:41:46 executing program 1: shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000080)=0x1e) 04:41:47 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in=@rand_addr}}, 0xe8) 04:41:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x0) 04:41:47 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6}]}) unshare(0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000001440)) 04:41:47 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000080)=0x1e) 04:41:47 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) 04:41:47 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) pipe(&(0x7f0000000000)) [ 653.211455] audit: type=1326 audit(1529728907.210:1044): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8373 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 653.265522] audit: type=1326 audit(1529728907.254:1045): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8381 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 653.297878] audit: type=1326 audit(1529728907.293:1046): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8376 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:47 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in=@rand_addr}}, 0xe8) 04:41:47 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000080)=0x1e) 04:41:47 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) 04:41:47 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f00000000c0)) [ 653.709583] audit: type=1326 audit(1529728907.708:1047): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8388 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:47 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000080)=0x1e) 04:41:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 04:41:47 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in=@rand_addr}}, 0xe8) 04:41:47 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in=@rand_addr}}, 0xe8) [ 653.862198] audit: type=1326 audit(1529728907.860:1048): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8400 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:47 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000080)=0x1e) 04:41:47 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) getpgrp(0xffffffffffffffff) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x0, 0x0) 04:41:48 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in=@rand_addr}}, 0xe8) 04:41:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x0) 04:41:48 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 04:41:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000080)=0x1e) 04:41:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in=@rand_addr}}, 0xe8) 04:41:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080)) 04:41:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) pipe(&(0x7f0000000000)) [ 654.211584] audit: type=1326 audit(1529728908.210:1049): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8425 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 654.313318] audit: type=1326 audit(1529728908.288:1050): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8435 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000080)=0x1e) 04:41:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) 04:41:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in=@rand_addr}}, 0xe8) 04:41:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080)) [ 654.663445] audit: type=1326 audit(1529728908.662:1051): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8454 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000080)=0x1e) 04:41:48 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 04:41:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in=@rand_addr}}, 0xe8) 04:41:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080)) 04:41:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) semget(0xffffffffffffffff, 0x0, 0x0) 04:41:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000080)=0x1e) 04:41:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x0) 04:41:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in=@rand_addr}}, 0xe8) 04:41:49 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 04:41:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080)) 04:41:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) semget(0xffffffffffffffff, 0x0, 0x0) [ 655.171344] audit: type=1326 audit(1529728909.167:1052): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8490 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in=@rand_addr}}, 0xe8) 04:41:49 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000080)=0x1e) 04:41:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) 04:41:49 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) getpgid(0x0) 04:41:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080)) 04:41:49 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 04:41:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) semget(0xffffffffffffffff, 0x0, 0x0) 04:41:49 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000080)=0x1e) 04:41:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in=@rand_addr}}, 0xe8) [ 655.616470] audit: type=1326 audit(1529728909.614:1053): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8505 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in=@rand_addr}}, 0xe8) 04:41:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080)) 04:41:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080)) 04:41:50 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 04:41:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) semget(0xffffffffffffffff, 0x0, 0x0) 04:41:50 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) getpgid(0x0) 04:41:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080)=0xffffffffffffff52, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 04:41:50 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 04:41:50 executing program 3: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080)) 04:41:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080)=0xffffffffffffff52, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 04:41:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000100)) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) 04:41:50 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) getpgid(0x0) 04:41:50 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000080)=0x1e) 04:41:50 executing program 3: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080)) 04:41:50 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 04:41:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000000c0)=ANY=[]) 04:41:50 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in=@rand_addr}}, 0xe8) 04:41:50 executing program 3: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080)) 04:41:50 executing program 7: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 04:41:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080)=0xffffffffffffff52, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 04:41:50 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) getpgid(0x0) 04:41:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000100)) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) 04:41:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000000c0)=ANY=[]) 04:41:50 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080)) 04:41:50 executing program 7: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 04:41:51 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080)=0xffffffffffffff52, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 04:41:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) getpgid(0x0) 04:41:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000100)) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) 04:41:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000080)=0x1e) 04:41:51 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080)) 04:41:51 executing program 7: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 04:41:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000000c0)=ANY=[]) 04:41:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000100)) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) 04:41:51 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in=@rand_addr}}, 0xe8) 04:41:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) getpgid(0x0) 04:41:51 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080)) 04:41:51 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 04:41:51 executing program 7: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 04:41:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000000c0)=ANY=[]) 04:41:51 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 04:41:51 executing program 7: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 04:41:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080)) 04:41:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) getpgid(0x0) 04:41:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) 04:41:52 executing program 7: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 04:41:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000000c0)=ANY=[]) 04:41:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080)) 04:41:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 04:41:52 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) init_module(&(0x7f0000000500)='posix_acl_accessself\x00', 0x15, &(0x7f0000000580)='$,\x00') 04:41:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080)) 04:41:52 executing program 4: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) getpgid(0x0) 04:41:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) 04:41:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000080)=""/131) 04:41:52 executing program 0: accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080)=0xffffffffffffff52, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 04:41:52 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 04:41:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000000c0)=ANY=[]) 04:41:52 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) init_module(&(0x7f0000000500)='posix_acl_accessself\x00', 0x15, &(0x7f0000000580)='$,\x00') 04:41:52 executing program 4: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) getpgid(0x0) 04:41:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080)) 04:41:52 executing program 0: accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080)=0xffffffffffffff52, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 04:41:52 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 04:41:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) 04:41:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000000c0)=ANY=[]) 04:41:52 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) init_module(&(0x7f0000000500)='posix_acl_accessself\x00', 0x15, &(0x7f0000000580)='$,\x00') 04:41:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000080)=""/131) 04:41:53 executing program 4: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) getpgid(0x0) 04:41:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080)) 04:41:53 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 04:41:53 executing program 0: accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080)=0xffffffffffffff52, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 04:41:53 executing program 2: socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000100)) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) 04:41:53 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000000c0)=ANY=[]) 04:41:53 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) getpgid(0x0) 04:41:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) init_module(&(0x7f0000000500)='posix_acl_accessself\x00', 0x15, &(0x7f0000000580)='$,\x00') 04:41:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) setuid(0x0) 04:41:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080)) 04:41:53 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080)=0xffffffffffffff52, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 04:41:53 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 04:41:53 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000000c0)=ANY=[]) 04:41:53 executing program 2: socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000100)) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) 04:41:53 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) getpgid(0x0) 04:41:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080)) 04:41:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) setuid(0x0) 04:41:53 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080)=0xffffffffffffff52, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 04:41:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) init_module(&(0x7f0000000500)='posix_acl_accessself\x00', 0x15, &(0x7f0000000580)='$,\x00') 04:41:53 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) [ 659.660824] kauditd_printk_skb: 6 callbacks suppressed [ 659.660848] audit: type=1326 audit(1529728913.659:1060): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8777 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:53 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000000c0)=ANY=[]) 04:41:53 executing program 2: socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000100)) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) 04:41:53 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) getpgid(0x0) 04:41:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) init_module(&(0x7f0000000500)='posix_acl_accessself\x00', 0x15, &(0x7f0000000580)='$,\x00') 04:41:53 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080)=0xffffffffffffff52, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 04:41:53 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 04:41:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) setuid(0x0) 04:41:53 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000000c0)=ANY=[]) 04:41:54 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) getpgid(0x0) 04:41:54 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000100)) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) 04:41:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080)=0xffffffffffffff52, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 04:41:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080)) 04:41:54 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) init_module(&(0x7f0000000500)='posix_acl_accessself\x00', 0x15, &(0x7f0000000580)='$,\x00') 04:41:54 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 04:41:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) setuid(0x0) 04:41:54 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000000c0)=ANY=[]) 04:41:54 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) getpgid(0x0) 04:41:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080)=0xffffffffffffff52, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 04:41:54 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000100)) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) [ 660.569378] audit: type=1326 audit(1529728914.568:1061): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8841 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:54 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) getpgid(0x0) 04:41:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080)=0xffffffffffffff52, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) [ 660.652870] audit: type=1326 audit(1529728914.611:1062): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8851 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:54 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000000c0)=ANY=[]) 04:41:54 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) init_module(&(0x7f0000000500)='posix_acl_accessself\x00', 0x15, &(0x7f0000000580)='$,\x00') 04:41:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) setuid(0x0) 04:41:54 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000100)) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) 04:41:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080)=0xffffffffffffff52, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 04:41:54 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) getpgid(0x0) 04:41:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080)) 04:41:55 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000000c0)=ANY=[]) 04:41:55 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) init_module(&(0x7f0000000500)='posix_acl_accessself\x00', 0x15, &(0x7f0000000580)='$,\x00') 04:41:55 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080)=0xffffffffffffff52, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 04:41:55 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) setuid(0x0) 04:41:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000100)) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) 04:41:55 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) getpgid(0x0) 04:41:55 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) [ 661.552924] audit: type=1326 audit(1529728915.551:1063): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8895 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:55 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080)=0xffffffffffffff52, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 04:41:55 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) getpgid(0x0) 04:41:55 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) init_module(&(0x7f0000000500)='posix_acl_accessself\x00', 0x15, &(0x7f0000000580)='$,\x00') [ 661.616242] audit: type=1326 audit(1529728915.613:1064): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8891 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:55 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000000c0)=ANY=[]) 04:41:55 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) setuid(0x0) 04:41:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000100)) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) 04:41:55 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) init_module(&(0x7f0000000500)='posix_acl_accessself\x00', 0x15, &(0x7f0000000580)='$,\x00') 04:41:55 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000000c0)=ANY=[]) 04:41:56 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000000c0)=ANY=[]) 04:41:56 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080)=0xffffffffffffff52, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 04:41:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) getpgid(0x0) 04:41:56 executing program 6: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) setuid(0x0) 04:41:56 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) init_module(&(0x7f0000000500)='posix_acl_accessself\x00', 0x15, &(0x7f0000000580)='$,\x00') 04:41:56 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000100)) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) 04:41:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000280)={@local}, &(0x7f00000002c0)=0x14) 04:41:56 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) [ 662.477710] audit: type=1326 audit(1529728916.476:1065): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8946 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:56 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) init_module(&(0x7f0000000500)='posix_acl_accessself\x00', 0x15, &(0x7f0000000580)='$,\x00') 04:41:56 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000000c0)=ANY=[]) 04:41:56 executing program 6: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) setuid(0x0) [ 662.571194] audit: type=1326 audit(1529728916.497:1066): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8948 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 662.590994] audit: type=1326 audit(1529728916.560:1067): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8960 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:56 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000100)) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) 04:41:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000280)={@local}, &(0x7f00000002c0)=0x14) 04:41:56 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000000c0)=ANY=[]) 04:41:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) init_module(&(0x7f0000000500)='posix_acl_accessself\x00', 0x15, &(0x7f0000000580)='$,\x00') 04:41:56 executing program 6: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) setuid(0x0) 04:41:56 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000100)) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) 04:41:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080)=0xffffffffffffff52, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 04:41:57 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) setuid(0x0) 04:41:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000000c0)=ANY=[]) 04:41:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) init_module(&(0x7f0000000500)='posix_acl_accessself\x00', 0x15, &(0x7f0000000580)='$,\x00') 04:41:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000280)={@local}, &(0x7f00000002c0)=0x14) 04:41:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000100)) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) [ 663.430692] audit: type=1326 audit(1529728917.429:1068): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9007 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) getpgid(0x0) 04:41:57 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) prctl$setptracer(0x59616d61, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000140)) [ 663.505936] audit: type=1326 audit(1529728917.504:1069): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9016 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:57 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) setuid(0x0) 04:41:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) init_module(&(0x7f0000000500)='posix_acl_accessself\x00', 0x15, &(0x7f0000000580)='$,\x00') 04:41:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000280)={@local}, &(0x7f00000002c0)=0x14) 04:41:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000100)) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) 04:41:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) init_module(&(0x7f0000000500)='posix_acl_accessself\x00', 0x15, &(0x7f0000000580)='$,\x00') 04:41:57 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) setuid(0x0) 04:41:57 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) prctl$setptracer(0x59616d61, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000140)) 04:41:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000280)={@local}, &(0x7f00000002c0)=0x14) 04:41:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080)=0xffffffffffffff52, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 04:41:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) init_module(&(0x7f0000000500)='posix_acl_accessself\x00', 0x15, &(0x7f0000000580)='$,\x00') 04:41:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) setuid(0x0) 04:41:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) prctl$setptracer(0x59616d61, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000140)) 04:41:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000280)={@local}, &(0x7f00000002c0)=0x14) 04:41:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000000c0)=ANY=[]) 04:41:58 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) getpgid(0x0) 04:41:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) init_module(&(0x7f0000000500)='posix_acl_accessself\x00', 0x15, &(0x7f0000000580)='$,\x00') 04:41:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) setuid(0x0) 04:41:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000280)={@local}, &(0x7f00000002c0)=0x14) 04:41:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) prctl$setptracer(0x59616d61, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000140)) 04:41:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000100)) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) 04:41:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) init_module(&(0x7f0000000500)='posix_acl_accessself\x00', 0x15, &(0x7f0000000580)='$,\x00') 04:41:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) setuid(0x0) 04:41:58 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000280)={@local}, &(0x7f00000002c0)=0x14) [ 664.764287] kauditd_printk_skb: 5 callbacks suppressed [ 664.764309] audit: type=1326 audit(1529728918.762:1075): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9087 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000140)) [ 664.851565] audit: type=1326 audit(1529728918.800:1076): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9089 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:59 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000000c0)=ANY=[]) 04:41:59 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000280)={@local}, &(0x7f00000002c0)=0x14) 04:41:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) add_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f0000000180), 0x0, 0xfffffffffffffffe) keyctl$update(0x2, 0x0, &(0x7f00000001c0), 0x0) 04:41:59 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) setuid(0x0) 04:41:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000140)) 04:41:59 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) socket$inet_tcp(0x2, 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003400), 0x0, 0x0, &(0x7f0000003580)) [ 665.450193] audit: type=1326 audit(1529728919.448:1077): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9114 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:59 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) setuid(0x0) 04:41:59 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000280)={@local}, &(0x7f00000002c0)=0x14) 04:41:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000140)) 04:41:59 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) setuid(0x0) 04:41:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240)='bridge0\x00', 0x10) 04:41:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000100)) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) 04:41:59 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000280)={@local}, &(0x7f00000002c0)=0x14) 04:41:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) init_module(&(0x7f0000000500)='posix_acl_accessself\x00', 0x15, &(0x7f0000000580)='$,\x00') 04:41:59 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) socket$inet_tcp(0x2, 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003400), 0x0, 0x0, &(0x7f0000003580)) 04:41:59 executing program 7: prctl$setptracer(0x59616d61, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000140)) [ 665.854544] audit: type=1326 audit(1529728919.853:1078): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9144 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 665.984650] audit: type=1326 audit(1529728919.980:1079): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9147 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:00 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000280)={@local}, &(0x7f00000002c0)=0x14) 04:42:00 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) setuid(0x0) 04:42:00 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) dup(0xffffffffffffffff) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000040), 0x4) 04:42:00 executing program 7: prctl$setptracer(0x59616d61, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000140)) 04:42:00 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) init_module(&(0x7f0000000040)='vboxnet0\x00', 0x9, &(0x7f00000000c0)="2a776c616e30aa5c3a6d643573756d76626f786e6574306d696d655f74797065656d3000") getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000100)={'broute\x00'}, &(0x7f0000000180)=0x78) 04:42:00 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) socket$inet_tcp(0x2, 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003400), 0x0, 0x0, &(0x7f0000003580)) [ 666.377769] audit: type=1326 audit(1529728920.376:1080): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9166 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:00 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000280)={@local}, &(0x7f00000002c0)=0x14) 04:42:00 executing program 7: prctl$setptracer(0x59616d61, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000140)) 04:42:00 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) socket$inet_tcp(0x2, 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003400), 0x0, 0x0, &(0x7f0000003580)) 04:42:00 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) prctl$setptracer(0x59616d61, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000140)) 04:42:00 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) init_module(&(0x7f0000000040)='vboxnet0\x00', 0x9, &(0x7f00000000c0)="2a776c616e30aa5c3a6d643573756d76626f786e6574306d696d655f74797065656d3000") getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000100)={'broute\x00'}, &(0x7f0000000180)=0x78) 04:42:00 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) init_module(&(0x7f0000000500)='posix_acl_accessself\x00', 0x15, &(0x7f0000000580)='$,\x00') 04:42:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) seccomp(0x0, 0x0, &(0x7f0000000040)) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000280)={@local}, &(0x7f00000002c0)=0x14) 04:42:00 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) 04:42:00 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000003400), 0x0, 0x0, &(0x7f0000003580)) 04:42:00 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) prctl$setptracer(0x59616d61, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000140)) 04:42:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000001c0)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) [ 666.828688] audit: type=1326 audit(1529728920.827:1081): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9199 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:01 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) prctl$setptracer(0x59616d61, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000140)) 04:42:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) 04:42:01 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) setuid(0x0) 04:42:01 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) init_module(&(0x7f0000000040)='vboxnet0\x00', 0x9, &(0x7f00000000c0)="2a776c616e30aa5c3a6d643573756d76626f786e6574306d696d655f74797065656d3000") getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000100)={'broute\x00'}, &(0x7f0000000180)=0x78) 04:42:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) fdatasync(0xffffffffffffffff) 04:42:01 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000003400), 0x0, 0x0, &(0x7f0000003580)) 04:42:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) seccomp(0x0, 0x0, &(0x7f0000000040)) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000280)={@local}, &(0x7f00000002c0)=0x14) 04:42:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) seccomp(0x0, 0x0, &(0x7f0000000040)) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000280)={@local}, &(0x7f00000002c0)=0x14) [ 667.360430] audit: type=1326 audit(1529728921.359:1082): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9234 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:01 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) prctl$setptracer(0x59616d61, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000140)) 04:42:01 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) init_module(&(0x7f0000000040)='vboxnet0\x00', 0x9, &(0x7f00000000c0)="2a776c616e30aa5c3a6d643573756d76626f786e6574306d696d655f74797065656d3000") getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000100)={'broute\x00'}, &(0x7f0000000180)=0x78) 04:42:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) fdatasync(0xffffffffffffffff) 04:42:01 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000003400), 0x0, 0x0, &(0x7f0000003580)) 04:42:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) 04:42:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000280)={@local}, &(0x7f00000002c0)=0x14) 04:42:01 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000100)={'broute\x00'}, &(0x7f0000000180)=0x78) 04:42:01 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) prctl$setptracer(0x59616d61, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000140)) 04:42:01 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x0) 04:42:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) setuid(0x0) 04:42:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000280)={@local}, &(0x7f00000002c0)=0x14) 04:42:02 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) prctl$setptracer(0x59616d61, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000140)) 04:42:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000100)={'broute\x00'}, &(0x7f0000000180)=0x78) 04:42:02 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003400), 0x0, 0x0, &(0x7f0000003580)) 04:42:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) 04:42:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) fdatasync(0xffffffffffffffff) 04:42:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x0) [ 668.276906] audit: type=1326 audit(1529728922.274:1083): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9277 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000280)={@local}, &(0x7f00000002c0)=0x14) 04:42:02 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003400), 0x0, 0x0, &(0x7f0000003580)) 04:42:02 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) prctl$setptracer(0x59616d61, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000140)) 04:42:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) fdatasync(0xffffffffffffffff) 04:42:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x0) 04:42:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) 04:42:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000100)={'broute\x00'}, &(0x7f0000000180)=0x78) 04:42:02 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) prctl$setptracer(0x59616d61, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000140)) 04:42:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) prctl$setptracer(0x59616d61, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000140)) 04:42:03 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000280)={@local}, &(0x7f00000002c0)=0x14) 04:42:03 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003400), 0x0, 0x0, &(0x7f0000003580)) 04:42:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x0) 04:42:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)=""/47, 0x2f) 04:42:03 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) 04:42:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) fdatasync(0xffffffffffffffff) 04:42:03 executing program 0: init_module(&(0x7f0000000040)='vboxnet0\x00', 0x9, &(0x7f00000000c0)="2a776c616e30aa5c3a6d643573756d76626f786e6574306d696d655f74797065656d3000") getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000100)={'broute\x00'}, &(0x7f0000000180)=0x78) [ 669.237977] audit: type=1326 audit(1529728923.236:1084): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9333 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:03 executing program 0: init_module(&(0x7f0000000040)='vboxnet0\x00', 0x9, &(0x7f00000000c0)="2a776c616e30aa5c3a6d643573756d76626f786e6574306d696d655f74797065656d3000") getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000100)={'broute\x00'}, &(0x7f0000000180)=0x78) 04:42:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) prctl$setptracer(0x59616d61, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000140)) 04:42:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) fdatasync(0xffffffffffffffff) 04:42:03 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) socket$inet_tcp(0x2, 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003400), 0x0, 0x0, &(0x7f0000003580)) 04:42:03 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) 04:42:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x0) 04:42:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)=""/47, 0x2f) 04:42:03 executing program 0: init_module(&(0x7f0000000040)='vboxnet0\x00', 0x9, &(0x7f00000000c0)="2a776c616e30aa5c3a6d643573756d76626f786e6574306d696d655f74797065656d3000") getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000100)={'broute\x00'}, &(0x7f0000000180)=0x78) 04:42:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) fdatasync(0xffffffffffffffff) 04:42:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000280)={@local}, &(0x7f00000002c0)=0x14) 04:42:04 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) socket$inet_tcp(0x2, 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003400), 0x0, 0x0, &(0x7f0000003580)) 04:42:04 executing program 5: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) 04:42:04 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) fdatasync(0xffffffffffffffff) 04:42:04 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x0) 04:42:04 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) init_module(&(0x7f0000000040)='vboxnet0\x00', 0x9, &(0x7f00000000c0)="2a776c616e30aa5c3a6d643573756d76626f786e6574306d696d655f74797065656d3000") getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000100)={'broute\x00'}, &(0x7f0000000180)=0x78) 04:42:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)=""/47, 0x2f) [ 670.158169] kauditd_printk_skb: 1 callbacks suppressed [ 670.158190] audit: type=1326 audit(1529728924.156:1086): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9378 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:04 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) fdatasync(0xffffffffffffffff) 04:42:04 executing program 5: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) 04:42:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) prctl$setptracer(0x59616d61, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000140)) 04:42:04 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) socket$inet_tcp(0x2, 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003400), 0x0, 0x0, &(0x7f0000003580)) 04:42:04 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) fdatasync(0xffffffffffffffff) 04:42:04 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x0) 04:42:04 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) init_module(&(0x7f0000000040)='vboxnet0\x00', 0x9, &(0x7f00000000c0)="2a776c616e30aa5c3a6d643573756d76626f786e6574306d696d655f74797065656d3000") getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000100)={'broute\x00'}, &(0x7f0000000180)=0x78) 04:42:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)=""/47, 0x2f) [ 670.508886] audit: type=1326 audit(1529728924.506:1087): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9416 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:04 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) fdatasync(0xffffffffffffffff) 04:42:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000280)={@local}, &(0x7f00000002c0)=0x14) 04:42:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) socket$inet_tcp(0x2, 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003400), 0x0, 0x0, &(0x7f0000003580)) 04:42:05 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) init_module(&(0x7f0000000040)='vboxnet0\x00', 0x9, &(0x7f00000000c0)="2a776c616e30aa5c3a6d643573756d76626f786e6574306d696d655f74797065656d3000") getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000100)={'broute\x00'}, &(0x7f0000000180)=0x78) 04:42:05 executing program 5: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) 04:42:05 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) fgetxattr(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)=""/47, 0x2f) 04:42:05 executing program 1: openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x0) 04:42:05 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) fdatasync(0xffffffffffffffff) [ 671.138600] audit: type=1326 audit(1529728925.137:1088): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9441 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:05 executing program 1: openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x0) 04:42:05 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) init_module(&(0x7f0000000040)='vboxnet0\x00', 0x9, &(0x7f00000000c0)="2a776c616e30aa5c3a6d643573756d76626f786e6574306d696d655f74797065656d3000") getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000100)={'broute\x00'}, &(0x7f0000000180)=0x78) 04:42:05 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) prctl$setptracer(0x59616d61, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000140)) 04:42:05 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) 04:42:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) socket$inet_tcp(0x2, 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003400), 0x0, 0x0, &(0x7f0000003580)) 04:42:05 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) fdatasync(0xffffffffffffffff) 04:42:05 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) fgetxattr(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)=""/47, 0x2f) 04:42:05 executing program 1: openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x0) 04:42:05 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) init_module(&(0x7f0000000040)='vboxnet0\x00', 0x9, &(0x7f00000000c0)="2a776c616e30aa5c3a6d643573756d76626f786e6574306d696d655f74797065656d3000") getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000100)={'broute\x00'}, &(0x7f0000000180)=0x78) [ 671.478770] audit: type=1326 audit(1529728925.477:1089): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9467 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:06 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) fgetxattr(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)=""/47, 0x2f) 04:42:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$inet_tcp(0x2, 0x1, 0x0) fdatasync(0xffffffffffffffff) 04:42:06 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) 04:42:06 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x0) 04:42:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) socket$inet_tcp(0x2, 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003400), 0x0, 0x0, &(0x7f0000003580)) 04:42:06 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) init_module(&(0x7f0000000040)='vboxnet0\x00', 0x9, &(0x7f00000000c0)="2a776c616e30aa5c3a6d643573756d76626f786e6574306d696d655f74797065656d3000") getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000100)={'broute\x00'}, &(0x7f0000000180)=0x78) 04:42:06 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket(0x40000000002, 0x2000000000000003, 0x2) r2 = socket$packet(0x11, 0x3, 0x300) sendto$unix(r1, &(0x7f0000000180), 0x0, 0x0, &(0x7f0000000240)=@abs, 0x6e) sendto$inet6(r2, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 04:42:06 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) 04:42:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$inet_tcp(0x2, 0x1, 0x0) fdatasync(0xffffffffffffffff) [ 672.142027] raw_sendmsg: syz-executor3 forgot to set AF_INET. Fix it! 04:42:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$inet_tcp(0x2, 0x1, 0x0) fdatasync(0xffffffffffffffff) 04:42:06 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x0) 04:42:06 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) init_module(&(0x7f0000000040)='vboxnet0\x00', 0x9, &(0x7f00000000c0)="2a776c616e30aa5c3a6d643573756d76626f786e6574306d696d655f74797065656d3000") getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000100)={'broute\x00'}, &(0x7f0000000180)=0x78) 04:42:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) socket$inet_tcp(0x2, 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003400), 0x0, 0x0, &(0x7f0000003580)) 04:42:06 executing program 6: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)=""/47, 0x2f) 04:42:06 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000)) 04:42:06 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000080)}) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 04:42:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) 04:42:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) fdatasync(0xffffffffffffffff) 04:42:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) 04:42:06 executing program 6: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)=""/47, 0x2f) 04:42:06 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x0) 04:42:06 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) init_module(&(0x7f0000000040)='vboxnet0\x00', 0x9, &(0x7f00000000c0)="2a776c616e30aa5c3a6d643573756d76626f786e6574306d696d655f74797065656d3000") getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000100)={'broute\x00'}, &(0x7f0000000180)=0x78) 04:42:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) socket$inet_tcp(0x2, 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003400), 0x0, 0x0, &(0x7f0000003580)) 04:42:06 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000080)}) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 04:42:06 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000)) 04:42:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) fdatasync(0xffffffffffffffff) 04:42:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x0) 04:42:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) 04:42:06 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) init_module(&(0x7f0000000040)='vboxnet0\x00', 0x9, &(0x7f00000000c0)="2a776c616e30aa5c3a6d643573756d76626f786e6574306d696d655f74797065656d3000") getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000100)={'broute\x00'}, &(0x7f0000000180)=0x78) 04:42:06 executing program 6: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)=""/47, 0x2f) 04:42:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) socket$inet_tcp(0x2, 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003400), 0x0, 0x0, &(0x7f0000003580)) 04:42:06 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000080)}) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 04:42:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) fdatasync(0xffffffffffffffff) 04:42:07 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000)) 04:42:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003400), 0x0, 0x0, &(0x7f0000003580)) 04:42:07 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)=""/47, 0x2f) 04:42:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) 04:42:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x0) 04:42:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) init_module(&(0x7f0000000040)='vboxnet0\x00', 0x9, &(0x7f00000000c0)="2a776c616e30aa5c3a6d643573756d76626f786e6574306d696d655f74797065656d3000") getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000100)={'broute\x00'}, &(0x7f0000000180)=0x78) [ 673.194394] audit: type=1326 audit(1529728927.183:1090): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9584 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:07 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000080)}) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 04:42:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) fdatasync(0xffffffffffffffff) 04:42:07 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)=""/47, 0x2f) [ 673.273136] audit: type=1326 audit(1529728927.218:1091): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9586 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x0) 04:42:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) [ 673.368722] audit: type=1326 audit(1529728927.357:1092): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9595 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:07 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000)) 04:42:07 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)=""/47, 0x2f) 04:42:07 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 04:42:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x0) 04:42:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) 04:42:07 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000)) 04:42:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003400), 0x0, 0x0, &(0x7f0000003580)) 04:42:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x0) 04:42:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)=""/47, 0x2f) 04:42:08 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) init_module(&(0x7f0000000040)='vboxnet0\x00', 0x9, &(0x7f00000000c0)="2a776c616e30aa5c3a6d643573756d76626f786e6574306d696d655f74797065656d3000") getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000100)={'broute\x00'}, &(0x7f0000000180)=0x78) 04:42:08 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 04:42:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) [ 674.155927] audit: type=1326 audit(1529728928.154:1093): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9636 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 674.227155] audit: type=1326 audit(1529728928.195:1094): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9643 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 674.247093] audit: type=1326 audit(1529728928.204:1095): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9641 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) fdatasync(0xffffffffffffffff) 04:42:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000)) 04:42:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)=""/47, 0x2f) 04:42:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x0) 04:42:08 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 04:42:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x0) 04:42:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)=""/47, 0x2f) 04:42:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000)) 04:42:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)=""/47, 0x2f) 04:42:08 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000080)}) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 04:42:09 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003400), 0x0, 0x0, &(0x7f0000003580)) 04:42:09 executing program 7: openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000)) 04:42:09 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000080)}) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 04:42:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) init_module(&(0x7f0000000040)='vboxnet0\x00', 0x9, &(0x7f00000000c0)="2a776c616e30aa5c3a6d643573756d76626f786e6574306d696d655f74797065656d3000") getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000100)={'broute\x00'}, &(0x7f0000000180)=0x78) 04:42:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)=""/47, 0x2f) 04:42:09 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) [ 675.189863] kauditd_printk_skb: 3 callbacks suppressed [ 675.189941] audit: type=1326 audit(1529728929.188:1099): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9692 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 675.245281] audit: type=1326 audit(1529728929.243:1100): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9697 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) fdatasync(0xffffffffffffffff) 04:42:09 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000080)}) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 04:42:09 executing program 7: openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000)) 04:42:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)=""/47, 0x2f) 04:42:09 executing program 7: openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000)) [ 675.355331] audit: type=1326 audit(1529728929.353:1101): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9708 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x0) 04:42:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)=""/47, 0x2f) 04:42:09 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000080)}) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 04:42:09 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000)) [ 675.520626] audit: type=1326 audit(1529728929.519:1102): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9718 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:09 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000080)}) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000001c0), &(0x7f0000000200)=0x4) [ 675.573772] audit: type=1326 audit(1529728929.565:1103): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9724 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:10 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000)) 04:42:10 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000080)}) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 04:42:10 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket$inet6_udplite(0xa, 0x2, 0x88) 04:42:10 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000080)}) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 04:42:10 executing program 0: 04:42:10 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) 04:42:10 executing program 0: 04:42:10 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000)) 04:42:10 executing program 4: 04:42:10 executing program 2: 04:42:10 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000080)}) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000001c0), &(0x7f0000000200)=0x4) [ 676.264760] audit: type=1326 audit(1529728930.263:1104): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9750 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:10 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x0) 04:42:10 executing program 0: 04:42:10 executing program 4: 04:42:10 executing program 2: 04:42:10 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000)) 04:42:10 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000080)}) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 04:42:10 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)=""/47, 0x2f) 04:42:10 executing program 4: 04:42:10 executing program 2: [ 676.580852] audit: type=1326 audit(1529728930.579:1105): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9771 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:10 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000080)}) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000001c0), &(0x7f0000000200)=0x4) [ 676.669886] audit: type=1326 audit(1529728930.640:1106): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9781 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:11 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000)) 04:42:11 executing program 0: 04:42:11 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000080)}) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 04:42:11 executing program 4: 04:42:11 executing program 2: 04:42:11 executing program 5: 04:42:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)=""/47, 0x2f) 04:42:11 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000080)}) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 04:42:11 executing program 0: 04:42:11 executing program 2: 04:42:11 executing program 4: 04:42:11 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000)) 04:42:11 executing program 5: 04:42:11 executing program 1: [ 677.571135] audit: type=1326 audit(1529728931.569:1107): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9815 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:11 executing program 5: 04:42:11 executing program 4: 04:42:11 executing program 0: 04:42:11 executing program 1: 04:42:11 executing program 2: 04:42:11 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000)) 04:42:11 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000080)}) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 04:42:11 executing program 2: [ 677.891617] audit: type=1326 audit(1529728931.887:1108): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9840 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:12 executing program 2: 04:42:12 executing program 0: 04:42:12 executing program 4: 04:42:12 executing program 1: 04:42:12 executing program 5: 04:42:12 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000)) 04:42:12 executing program 4: 04:42:12 executing program 2: 04:42:12 executing program 0: 04:42:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x1000000000000006, 0x0, 0x0, 0x502a1}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 04:42:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) syz_open_procfs(0x0, &(0x7f0000001e00)='loginuid\x00') connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) 04:42:12 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000)) 04:42:12 executing program 4: 04:42:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000100)) 04:42:12 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000080)}) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 04:42:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50353}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syncfs(0xffffffffffffffff) 04:42:12 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0xd}, 0x1c) 04:42:12 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000)) 04:42:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x1000000000000006, 0x0, 0x0, 0x502a1}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 04:42:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) syz_open_procfs(0x0, &(0x7f0000001e00)='loginuid\x00') connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) 04:42:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x40000000050251}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000340)) close(0xffffffffffffffff) 04:42:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000100)) 04:42:13 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50353}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syncfs(0xffffffffffffffff) 04:42:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x1000000000000006, 0x0, 0x0, 0x502a1}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 04:42:13 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) syz_open_procfs(0x0, &(0x7f0000001e00)='loginuid\x00') connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) 04:42:13 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50353}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syncfs(0xffffffffffffffff) 04:42:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000100)) 04:42:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x40000000050251}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000340)) close(0xffffffffffffffff) 04:42:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x1000000000000006, 0x0, 0x0, 0x502a1}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 04:42:13 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50353}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syncfs(0xffffffffffffffff) 04:42:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000100)) 04:42:13 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000080)}) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 04:42:13 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50353}]}) syncfs(0xffffffffffffffff) 04:42:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000)) 04:42:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x40000000050251}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000340)) close(0xffffffffffffffff) 04:42:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x1000000000000006, 0x0, 0x0, 0x502a1}]}) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 04:42:13 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) syz_open_procfs(0x0, &(0x7f0000001e00)='loginuid\x00') connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) 04:42:13 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50353}]}) syncfs(0xffffffffffffffff) 04:42:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000100)) 04:42:13 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) 04:42:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x40000000050251}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000340)) close(0xffffffffffffffff) 04:42:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x1000000000000006, 0x0, 0x0, 0x502a1}]}) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 04:42:14 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50353}]}) syncfs(0xffffffffffffffff) 04:42:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000100)) 04:42:14 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) 04:42:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x1000000000000006, 0x0, 0x0, 0x502a1}]}) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 04:42:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x40000000050251}]}) close(0xffffffffffffffff) 04:42:14 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) setuid(0x0) 04:42:14 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syncfs(0xffffffffffffffff) [ 680.706738] kauditd_printk_skb: 4 callbacks suppressed [ 680.706765] audit: type=1326 audit(1529728934.705:1113): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9991 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:14 executing program 1: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 04:42:14 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syncfs(0xffffffffffffffff) 04:42:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x40000000050251}]}) close(0xffffffffffffffff) 04:42:14 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) 04:42:14 executing program 3: 04:42:14 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000)) 04:42:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000100)) 04:42:14 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000100)) [ 680.865386] audit: type=1326 audit(1529728934.860:1114): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10009 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:14 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) modify_ldt$read(0x0, &(0x7f0000003340), 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 04:42:14 executing program 1: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 04:42:14 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syncfs(0xffffffffffffffff) 04:42:15 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x40000000050251}]}) close(0xffffffffffffffff) 04:42:15 executing program 5: syz_open_procfs(0x0, &(0x7f0000001e00)='loginuid\x00') connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) 04:42:15 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000100)) 04:42:15 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000001780)) 04:42:15 executing program 1: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 04:42:15 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50353}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syncfs(0xffffffffffffffff) 04:42:15 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x1000000000000006, 0x0, 0x0, 0x502a1}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 04:42:15 executing program 5: syz_open_procfs(0x0, &(0x7f0000001e00)='loginuid\x00') connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) 04:42:15 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f0000000100)) 04:42:15 executing program 0: socketpair(0x0, 0x0, 0x0, &(0x7f0000000340)) close(0xffffffffffffffff) 04:42:15 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000100)) 04:42:15 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50353}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syncfs(0xffffffffffffffff) 04:42:15 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000380)) 04:42:15 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000001780)) 04:42:15 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50353}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syncfs(0xffffffffffffffff) 04:42:15 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f0000000100)) 04:42:15 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x1000000000000006, 0x0, 0x0, 0x502a1}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 04:42:15 executing program 5: syz_open_procfs(0x0, &(0x7f0000001e00)='loginuid\x00') connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) 04:42:15 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000100)) 04:42:16 executing program 0: socketpair(0x0, 0x0, 0x0, &(0x7f0000000340)) close(0xffffffffffffffff) 04:42:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000001780)) 04:42:16 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000380)) 04:42:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syncfs(0xffffffffffffffff) 04:42:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f0000000100)) 04:42:16 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) syz_open_procfs(0x0, &(0x7f0000001e00)='loginuid\x00') connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) 04:42:16 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000100)) 04:42:16 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x1000000000000006, 0x0, 0x0, 0x502a1}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 04:42:16 executing program 0: socketpair(0x0, 0x0, 0x0, &(0x7f0000000340)) close(0xffffffffffffffff) 04:42:16 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000380)) 04:42:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000001780)) 04:42:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syncfs(0xffffffffffffffff) 04:42:16 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) syz_open_procfs(0x0, &(0x7f0000001e00)='loginuid\x00') connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) 04:42:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 04:42:16 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000100)) 04:42:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f0000000100)) 04:42:16 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x40000000050251}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000340)) close(0xffffffffffffffff) 04:42:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syncfs(0xffffffffffffffff) 04:42:16 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000380)) 04:42:16 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) syz_open_procfs(0x0, &(0x7f0000001e00)='loginuid\x00') connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) 04:42:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000100)) 04:42:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000001780)) 04:42:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 04:42:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]}) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f0000000100)) 04:42:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000100)) 04:42:16 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) write$fuse(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @fuse_notify_store_out}, 0x28) 04:42:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50353}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syncfs(0xffffffffffffffff) 04:42:16 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x40000000050251}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000340)) close(0xffffffffffffffff) 04:42:16 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) syz_open_procfs(0x0, &(0x7f0000001e00)='loginuid\x00') connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) 04:42:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 04:42:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000001780)) 04:42:17 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]}) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f0000000100)) 04:42:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000100)) 04:42:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50353}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syncfs(0xffffffffffffffff) 04:42:17 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) syz_open_procfs(0x0, &(0x7f0000001e00)='loginuid\x00') connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) 04:42:17 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x40000000050251}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000340)) close(0xffffffffffffffff) 04:42:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000001780)) 04:42:17 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) write$fuse(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @fuse_notify_store_out}, 0x28) 04:42:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x502a1}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 04:42:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000100)) 04:42:17 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]}) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f0000000100)) 04:42:17 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) syz_open_procfs(0x0, &(0x7f0000001e00)='loginuid\x00') connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) 04:42:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50353}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syncfs(0xffffffffffffffff) 04:42:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000340)) close(0xffffffffffffffff) 04:42:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x502a1}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 04:42:17 executing program 6: openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000001780)) 04:42:17 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) write$fuse(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @fuse_notify_store_out}, 0x28) 04:42:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syncfs(0xffffffffffffffff) 04:42:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000100)) 04:42:17 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) syz_open_procfs(0x0, &(0x7f0000001e00)='loginuid\x00') connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) 04:42:17 executing program 3: ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f0000000100)) 04:42:17 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) write$fuse(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @fuse_notify_store_out}, 0x28) 04:42:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x502a1}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 04:42:17 executing program 6: openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000001780)) 04:42:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000340)) close(0xffffffffffffffff) [ 683.795223] audit: type=1326 audit(1529728937.793:1115): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10237 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000100)) 04:42:17 executing program 3: ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f0000000100)) 04:42:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) syz_open_procfs(0x0, &(0x7f0000001e00)='loginuid\x00') connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) 04:42:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x1000000000000006}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 04:42:18 executing program 6: openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000001780)) 04:42:18 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) write$fuse(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @fuse_notify_store_out}, 0x28) 04:42:18 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000340)) close(0xffffffffffffffff) 04:42:18 executing program 3: ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f0000000100)) [ 684.136668] audit: type=1326 audit(1529728938.135:1116): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10269 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:18 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syncfs(0xffffffffffffffff) 04:42:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000100)) 04:42:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) syz_open_procfs(0x0, &(0x7f0000001e00)='loginuid\x00') connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) 04:42:18 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) write$fuse(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @fuse_notify_store_out}, 0x28) 04:42:18 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000001780)) 04:42:18 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f0000000100)) 04:42:18 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x40000000050251}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000340)) close(0xffffffffffffffff) [ 684.725995] audit: type=1326 audit(1529728938.724:1117): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10296 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) syz_open_procfs(0x0, &(0x7f0000001e00)='loginuid\x00') connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) 04:42:18 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x40000000050251}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000340)) close(0xffffffffffffffff) 04:42:18 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000001780)) 04:42:18 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f0000000100)) [ 684.815439] audit: type=1326 audit(1529728938.767:1118): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10302 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 684.933113] audit: type=1326 audit(1529728938.901:1119): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10307 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x1000000000000006}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 04:42:19 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) write$fuse(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @fuse_notify_store_out}, 0x28) 04:42:19 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f0000000100)) 04:42:19 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x40000000050251}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000340)) close(0xffffffffffffffff) 04:42:19 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000001780)) [ 685.169606] audit: type=1326 audit(1529728939.167:1120): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10334 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:19 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syncfs(0xffffffffffffffff) 04:42:19 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f0000000100)) 04:42:19 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000340)) close(0xffffffffffffffff) 04:42:19 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)}) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000001780)) 04:42:19 executing program 7: socket$inet6(0xa, 0x0, 0x0) write$fuse(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @fuse_notify_store_out}, 0x28) 04:42:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000100)) [ 685.708596] audit: type=1326 audit(1529728939.707:1121): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10350 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:19 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f0000000100)) 04:42:19 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) syz_open_procfs(0x0, &(0x7f0000001e00)='loginuid\x00') connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) [ 685.747623] audit: type=1326 audit(1529728939.730:1122): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10346 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 685.782764] audit: type=1326 audit(1529728939.766:1123): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10348 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:19 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)}) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000001780)) 04:42:19 executing program 7: socket$inet6(0xa, 0x0, 0x0) write$fuse(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @fuse_notify_store_out}, 0x28) 04:42:19 executing program 7: socket$inet6(0xa, 0x0, 0x0) write$fuse(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @fuse_notify_store_out}, 0x28) [ 685.928222] audit: type=1326 audit(1529728939.926:1124): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10367 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x1000000000000006}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 04:42:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f0000000100)) 04:42:20 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)}) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000001780)) 04:42:20 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) write$fuse(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @fuse_notify_store_out}, 0x28) 04:42:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50358}]}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f0000000100)) [ 686.153237] audit: type=1326 audit(1529728940.151:1125): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10389 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:20 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) write$fuse(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @fuse_notify_store_out}, 0x28) 04:42:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50358}]}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f0000000100)) 04:42:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000340)) close(0xffffffffffffffff) 04:42:20 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022d}]}) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000001780)) 04:42:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000300)) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 04:42:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000100)) 04:42:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50358}]}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f0000000100)) [ 686.747495] audit: type=1326 audit(1529728940.746:1126): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10414 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:20 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) syz_open_procfs(0x0, &(0x7f0000001e00)='loginuid\x00') connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) 04:42:20 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) write$fuse(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @fuse_notify_store_out}, 0x28) 04:42:20 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022d}]}) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000001780)) 04:42:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f0000000100)) [ 686.834329] audit: type=1326 audit(1529728940.816:1127): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10422 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 686.948732] audit: type=1326 audit(1529728940.941:1128): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10434 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:21 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) socket$inet6(0xa, 0x0, 0x0) write$fuse(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @fuse_notify_store_out}, 0x28) 04:42:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000300)) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 04:42:21 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022d}]}) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000001780)) 04:42:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050199}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000100)) [ 687.036126] audit: type=1326 audit(1529728941.030:1129): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10433 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:21 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]}) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000001780)) 04:42:21 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) socket$inet6(0xa, 0x0, 0x0) write$fuse(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @fuse_notify_store_out}, 0x28) [ 687.214896] audit: type=1326 audit(1529728941.213:1130): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10454 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000300)) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 04:42:21 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000340)) close(0xffffffffffffffff) 04:42:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050199}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000100)) 04:42:21 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) socket$inet6(0xa, 0x0, 0x0) write$fuse(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @fuse_notify_store_out}, 0x28) 04:42:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000300)) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 04:42:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) setitimer(0x0, &(0x7f00000000c0)={{0x77359400}}, &(0x7f0000000100)) 04:42:21 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) write$fuse(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @fuse_notify_store_out}, 0x28) 04:42:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050199}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000100)) 04:42:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c, 0x0) 04:42:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f0000000100)) 04:42:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 04:42:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) setitimer(0x0, &(0x7f00000000c0)={{0x77359400}}, &(0x7f0000000100)) 04:42:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050199}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000100)) 04:42:22 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) write$fuse(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @fuse_notify_store_out}, 0x28) 04:42:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]}) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000001780)) 04:42:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c, 0x0) 04:42:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 04:42:22 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) write$fuse(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @fuse_notify_store_out}, 0x28) 04:42:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) setitimer(0x0, &(0x7f00000000c0)={{0x77359400}}, &(0x7f0000000100)) 04:42:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050199}]}) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000100)) 04:42:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c, 0x0) 04:42:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 04:42:22 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ff4000/0xb000)=nil, 0xb000}, &(0x7f0000000080)=0x10) 04:42:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050199}]}) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000100)) 04:42:22 executing program 4: socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000300)) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 04:42:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f0000000100)) 04:42:22 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) write$fuse(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @fuse_notify_store_out}, 0x28) 04:42:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c, 0x0) 04:42:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) setitimer(0x0, &(0x7f00000000c0)={{0x77359400}}, &(0x7f0000000100)) 04:42:22 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ff4000/0xb000)=nil, 0xb000}, &(0x7f0000000080)=0x10) 04:42:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]}) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000001780)) 04:42:23 executing program 4: socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000300)) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 04:42:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050199}]}) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000100)) 04:42:23 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ff4000/0xb000)=nil, 0xb000}, &(0x7f0000000080)=0x10) 04:42:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c, 0x0) 04:42:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) setitimer(0x0, &(0x7f00000000c0)={{0x77359400}}, &(0x7f0000000100)) 04:42:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c, 0x0) 04:42:23 executing program 4: socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000300)) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 04:42:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) setitimer(0x0, &(0x7f00000000c0)={{0x77359400}}, &(0x7f0000000100)) 04:42:23 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000100)) 04:42:23 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ff4000/0xb000)=nil, 0xb000}, &(0x7f0000000080)=0x10) 04:42:23 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) write$fuse(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @fuse_notify_store_out}, 0x28) 04:42:23 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000300)) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 04:42:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c, 0x0) 04:42:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) setitimer(0x0, &(0x7f00000000c0)={{0x77359400}}, &(0x7f0000000100)) 04:42:23 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000100)) 04:42:24 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) setitimer(0x0, &(0x7f00000000c0)={{0x77359400}}, &(0x7f0000000100)) 04:42:24 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ff4000/0xb000)=nil, 0xb000}, &(0x7f0000000080)=0x10) 04:42:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 04:42:24 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000300)) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 04:42:24 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000100)) 04:42:24 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c, 0x0) 04:42:24 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000140)) 04:42:24 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c, 0x0) 04:42:24 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000300)) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 04:42:24 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) setitimer(0x0, &(0x7f00000000c0)={{0x77359400}}, &(0x7f0000000100)) 04:42:24 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050199}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000100)) 04:42:24 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) write$fuse(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @fuse_notify_store_out}, 0x28) 04:42:24 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ff4000/0xb000)=nil, 0xb000}, &(0x7f0000000080)=0x10) 04:42:24 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c, 0x0) 04:42:24 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000140)) 04:42:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 04:42:24 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050199}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000100)) 04:42:24 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) setitimer(0x0, &(0x7f00000000c0)={{0x77359400}}, &(0x7f0000000100)) 04:42:24 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000300)) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) [ 690.924546] kauditd_printk_skb: 7 callbacks suppressed [ 690.924569] audit: type=1326 audit(1529728944.920:1138): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10674 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:25 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050199}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000100)) 04:42:25 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) setitimer(0x0, &(0x7f00000000c0)={{0x77359400}}, &(0x7f0000000100)) 04:42:25 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ff4000/0xb000)=nil, 0xb000}, &(0x7f0000000080)=0x10) 04:42:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000300)) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 04:42:25 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c, 0x0) 04:42:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 04:42:25 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000140)) 04:42:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000100)) 04:42:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000100)) 04:42:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000300)) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 04:42:25 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) setitimer(0x0, &(0x7f00000000c0)={{0x77359400}}, &(0x7f0000000100)) 04:42:25 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c, 0x0) 04:42:25 executing program 0: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ff4000/0xb000)=nil, 0xb000}, &(0x7f0000000080)=0x10) 04:42:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 04:42:25 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000140)) 04:42:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50357}]}) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f00000000c0)) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000180)={0x0, &(0x7f0000000100)}) 04:42:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022d}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000300)) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 04:42:25 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c, 0x0) 04:42:25 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) setitimer(0x0, &(0x7f00000000c0)={{0x77359400}}, &(0x7f0000000100)) 04:42:25 executing program 0: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ff4000/0xb000)=nil, 0xb000}, &(0x7f0000000080)=0x10) 04:42:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000100)) 04:42:26 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000140)) 04:42:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 04:42:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50357}]}) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f00000000c0)) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000180)={0x0, &(0x7f0000000100)}) 04:42:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) setitimer(0x0, &(0x7f00000000c0)={{0x77359400}}, &(0x7f0000000100)) 04:42:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050199}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000100)) 04:42:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022d}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000300)) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 04:42:26 executing program 0: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ff4000/0xb000)=nil, 0xb000}, &(0x7f0000000080)=0x10) 04:42:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$inet_tcp(0x2, 0x1, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c, 0x0) 04:42:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 04:42:26 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000140)) 04:42:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50357}]}) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f00000000c0)) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000180)={0x0, &(0x7f0000000100)}) 04:42:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) setitimer(0x0, &(0x7f00000000c0)={{0x77359400}}, &(0x7f0000000100)) 04:42:26 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ff4000/0xb000)=nil, 0xb000}, &(0x7f0000000080)=0x10) 04:42:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$inet_tcp(0x2, 0x1, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c, 0x0) 04:42:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050199}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000100)) 04:42:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022d}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000300)) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 04:42:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 04:42:26 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000140)) 04:42:26 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ff4000/0xb000)=nil, 0xb000}, &(0x7f0000000080)=0x10) 04:42:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) setitimer(0x0, &(0x7f00000000c0)={{0x77359400}}, &(0x7f0000000100)) 04:42:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000300)) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 04:42:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$inet_tcp(0x2, 0x1, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c, 0x0) 04:42:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50357}]}) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f00000000c0)) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000180)={0x0, &(0x7f0000000100)}) 04:42:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050199}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000100)) [ 692.795890] audit: type=1326 audit(1529728946.794:1139): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10805 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c, 0x0) 04:42:26 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ff4000/0xb000)=nil, 0xb000}, &(0x7f0000000080)=0x10) 04:42:26 executing program 3: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 04:42:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) setitimer(0x0, &(0x7f00000000c0)={{0x77359400}}, &(0x7f0000000100)) 04:42:27 executing program 6: socket$inet6(0xa, 0x0, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000140)) 04:42:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000100)) 04:42:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50357}]}) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000180)={0x0, &(0x7f0000000100)}) [ 693.130166] audit: type=1326 audit(1529728947.128:1140): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10835 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:27 executing program 3: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 04:42:27 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ff4000/0xb000)=nil, 0xb000}, &(0x7f0000000080)=0x10) 04:42:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) setitimer(0x0, &(0x7f00000000c0)={{0x77359400}}, &(0x7f0000000100)) 04:42:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c, 0x0) 04:42:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50357}]}) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000180)={0x0, &(0x7f0000000100)}) 04:42:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000300)) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 04:42:27 executing program 6: socket$inet6(0xa, 0x0, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000140)) 04:42:27 executing program 3: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 04:42:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) setitimer(0x0, &(0x7f00000000c0)={{0x77359400}}, &(0x7f0000000100)) 04:42:27 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ff4000/0xb000)=nil, 0xb000}, &(0x7f0000000080)=0x10) 04:42:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c, 0x0) 04:42:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50357}]}) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000180)={0x0, &(0x7f0000000100)}) 04:42:27 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 693.782596] audit: type=1326 audit(1529728947.780:1141): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10875 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:27 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ff4000/0xb000)=nil, 0xb000}, &(0x7f0000000080)=0x10) 04:42:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000100)) 04:42:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) setitimer(0x0, &(0x7f00000000c0)={{0x77359400}}, &(0x7f0000000100)) 04:42:28 executing program 6: socket$inet6(0xa, 0x0, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000140)) 04:42:28 executing program 7: ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f00000000c0)) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000180)={0x0, &(0x7f0000000100)}) 04:42:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c, 0x0) 04:42:28 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 04:42:28 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ff4000/0xb000)=nil, 0xb000}, &(0x7f0000000080)=0x10) [ 694.069344] audit: type=1326 audit(1529728948.068:1142): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10899 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 694.128304] audit: type=1326 audit(1529728948.089:1143): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10900 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 694.148471] audit: type=1326 audit(1529728948.112:1144): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10903 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:28 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000140)) 04:42:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000300)) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 04:42:28 executing program 7: ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f00000000c0)) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000180)={0x0, &(0x7f0000000100)}) 04:42:28 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ff4000/0xb000)=nil, 0xb000}, &(0x7f0000000080)=0x10) 04:42:28 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 04:42:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 694.742112] audit: type=1326 audit(1529728948.740:1145): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10923 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:28 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ff4000/0xb000)=nil, 0xb000}, &(0x7f0000000080)=0x10) 04:42:28 executing program 7: ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f00000000c0)) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000180)={0x0, &(0x7f0000000100)}) 04:42:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 04:42:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000100)) 04:42:29 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000140)) 04:42:29 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ff4000/0xb000)=nil, 0xb000}, &(0x7f0000000080)=0x10) 04:42:29 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50357}]}) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f00000000c0)) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000180)={0x0, &(0x7f0000000100)}) 04:42:29 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) setitimer(0x0, &(0x7f00000000c0)={{0x77359400}}, &(0x7f0000000100)) 04:42:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c, 0x0) 04:42:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 695.108165] audit: type=1326 audit(1529728949.106:1146): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10948 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:29 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50357}]}) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f00000000c0)) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000180)={0x0, &(0x7f0000000100)}) [ 695.163761] audit: type=1326 audit(1529728949.145:1147): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10950 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 04:42:29 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000140)) 04:42:29 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50357}]}) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f00000000c0)) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000180)={0x0, &(0x7f0000000100)}) 04:42:29 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) timer_delete(0x0) 04:42:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000300)}) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f00000000c0)) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000180)={0x0, &(0x7f0000000100)}) 04:42:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 04:42:29 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) socket$inet6(0xa, 0x0, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000140)) 04:42:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000300)}) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f00000000c0)) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000180)={0x0, &(0x7f0000000100)}) 04:42:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c, 0x0) 04:42:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) timer_delete(0x0) 04:42:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 04:42:30 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) socket$inet6(0xa, 0x0, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000140)) 04:42:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000300)}) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f00000000c0)) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000180)={0x0, &(0x7f0000000100)}) 04:42:30 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) setitimer(0x0, &(0x7f00000000c0)={{0x77359400}}, &(0x7f0000000100)) 04:42:30 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ff4000/0xb000)=nil, 0xb000}, &(0x7f0000000080)=0x10) 04:42:30 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]}) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8) socket$unix(0x1, 0x0, 0x0) [ 696.142750] kauditd_printk_skb: 2 callbacks suppressed [ 696.142772] audit: type=1326 audit(1529728950.141:1150): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11011 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x50357}]}) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f00000000c0)) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000180)={0x0, &(0x7f0000000100)}) 04:42:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 04:42:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) timer_delete(0x0) [ 696.234621] audit: type=1326 audit(1529728950.173:1151): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11008 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 696.254481] audit: type=1326 audit(1529728950.179:1152): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11014 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x50357}]}) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f00000000c0)) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000180)={0x0, &(0x7f0000000100)}) 04:42:30 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) socket$inet6(0xa, 0x0, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000140)) 04:42:30 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]}) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8) socket$unix(0x1, 0x0, 0x0) [ 696.405422] audit: type=1326 audit(1529728950.351:1153): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11033 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) timer_delete(0x0) 04:42:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x50357}]}) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f00000000c0)) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000180)={0x0, &(0x7f0000000100)}) 04:42:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6}]}) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f00000000c0)) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000180)={0x0, &(0x7f0000000100)}) 04:42:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) timer_delete(0x0) 04:42:31 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000140)) 04:42:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]}) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8) socket$unix(0x1, 0x0, 0x0) 04:42:31 executing program 5: syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140)) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) [ 697.051756] audit: type=1326 audit(1529728951.050:1154): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11060 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:31 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ff4000/0xb000)=nil, 0xb000}, &(0x7f0000000080)=0x10) 04:42:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000300)) [ 697.164230] audit: type=1326 audit(1529728951.156:1155): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11076 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) timer_delete(0x0) 04:42:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]}) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8) socket$unix(0x1, 0x0, 0x0) 04:42:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 04:42:31 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000140)) 04:42:31 executing program 5: syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140)) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) 04:42:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) timer_delete(0x0) 04:42:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000300)) [ 697.436121] audit: type=1326 audit(1529728951.434:1156): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11092 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]}) socket$unix(0x1, 0x0, 0x0) 04:42:31 executing program 5: syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140)) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) 04:42:31 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) timer_delete(0x0) 04:42:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6}]}) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f00000000c0)) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000180)={0x0, &(0x7f0000000100)}) 04:42:31 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000140)) 04:42:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000300)) 04:42:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]}) socket$unix(0x1, 0x0, 0x0) [ 698.037511] audit: type=1326 audit(1529728952.036:1157): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11128 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000300)) 04:42:32 executing program 5: syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140)) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) 04:42:32 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) timer_delete(0x0) 04:42:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]}) socket$unix(0x1, 0x0, 0x0) 04:42:32 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 04:42:32 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]}) ustat(0x0, &(0x7f00000000c0)) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 04:42:32 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000140)) 04:42:32 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) timer_delete(0x0) 04:42:32 executing program 1: add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8) socket$unix(0x1, 0x0, 0x0) 04:42:32 executing program 5: syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) 04:42:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000300)) [ 698.388832] audit: type=1326 audit(1529728952.387:1158): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11152 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:32 executing program 1: add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8) socket$unix(0x1, 0x0, 0x0) [ 698.471200] audit: type=1326 audit(1529728952.432:1159): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11162 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:32 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6}]}) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f00000000c0)) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000180)={0x0, &(0x7f0000000100)}) 04:42:32 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) timer_delete(0x0) 04:42:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000300)) 04:42:32 executing program 5: syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) 04:42:32 executing program 1: add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8) socket$unix(0x1, 0x0, 0x0) 04:42:32 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]}) ustat(0x0, &(0x7f00000000c0)) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 04:42:33 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]}) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8) socket$unix(0x1, 0x0, 0x0) 04:42:33 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) timer_delete(0x0) 04:42:33 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000140)) 04:42:33 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]}) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8) socket$unix(0x1, 0x0, 0x0) 04:42:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000300)) 04:42:33 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]}) ustat(0x0, &(0x7f00000000c0)) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 04:42:33 executing program 5: syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) 04:42:33 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) timer_delete(0x0) 04:42:33 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50234}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000140)) 04:42:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) timer_delete(0x0) 04:42:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) timer_delete(0x0) 04:42:33 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]}) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8) socket$unix(0x1, 0x0, 0x0) 04:42:33 executing program 5: syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140)) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) 04:42:33 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]}) ustat(0x0, &(0x7f00000000c0)) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 04:42:33 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50234}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000140)) 04:42:33 executing program 2: mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000300)) 04:42:33 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) prctl$setendian(0x14, 0x0) 04:42:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000300)}) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8) socket$unix(0x1, 0x0, 0x0) 04:42:34 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000140)) 04:42:34 executing program 5: syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140)) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) 04:42:34 executing program 2: mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000300)) 04:42:34 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) timer_delete(0x0) 04:42:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]}) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 04:42:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50234}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000140)) 04:42:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000300)}) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8) socket$unix(0x1, 0x0, 0x0) 04:42:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) prctl$setendian(0x14, 0x0) 04:42:34 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) timer_delete(0x0) 04:42:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000300)}) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8) socket$unix(0x1, 0x0, 0x0) 04:42:34 executing program 5: syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140)) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) 04:42:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50234}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000140)) 04:42:34 executing program 2: mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000300)) 04:42:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) prctl$setendian(0x14, 0x0) 04:42:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]}) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 04:42:34 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) timer_delete(0x0) 04:42:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50234}]}) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000140)) 04:42:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x50351}]}) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8) socket$unix(0x1, 0x0, 0x0) 04:42:35 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000300)) 04:42:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140)) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) 04:42:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) timer_delete(0x0) 04:42:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]}) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 04:42:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) prctl$setendian(0x14, 0x0) 04:42:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000040)={'veth1_to_bridge\x00', @ifru_data=&(0x7f0000000000)="f4cd6d76f3fb7e60272ce83605f0770b5c01a220d830f459485780f0e82f08b8"}}) 04:42:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) timer_delete(0x0) 04:42:35 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000300)) 04:42:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x50351}]}) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8) socket$unix(0x1, 0x0, 0x0) 04:42:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140)) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) 04:42:35 executing program 0: ustat(0x0, &(0x7f00000000c0)) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 04:42:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50234}]}) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000140)) 04:42:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) prctl$setendian(0x14, 0x0) [ 701.541834] kauditd_printk_skb: 3 callbacks suppressed [ 701.541856] audit: type=1326 audit(1529728955.540:1163): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11322 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000040)={'veth1_to_bridge\x00', @ifru_data=&(0x7f0000000000)="f4cd6d76f3fb7e60272ce83605f0770b5c01a220d830f459485780f0e82f08b8"}}) 04:42:35 executing program 0: ustat(0x0, &(0x7f00000000c0)) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 04:42:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x50351}]}) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8) socket$unix(0x1, 0x0, 0x0) 04:42:35 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000300)) 04:42:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) prctl$setendian(0x14, 0x0) 04:42:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50234}]}) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000140)) 04:42:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140)) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) 04:42:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000040)={'veth1_to_bridge\x00', @ifru_data=&(0x7f0000000000)="f4cd6d76f3fb7e60272ce83605f0770b5c01a220d830f459485780f0e82f08b8"}}) 04:42:35 executing program 0: ustat(0x0, &(0x7f00000000c0)) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 04:42:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) timer_delete(0x0) 04:42:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000300)) 04:42:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6}]}) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8) socket$unix(0x1, 0x0, 0x0) 04:42:36 executing program 3: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000140)) 04:42:36 executing program 5: syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140)) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) 04:42:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) prctl$setendian(0x14, 0x0) 04:42:36 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]}) ustat(0x0, &(0x7f00000000c0)) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 04:42:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) [ 702.461650] audit: type=1326 audit(1529728956.460:1164): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11382 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 702.521826] audit: type=1326 audit(1529728956.513:1165): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11378 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:36 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]}) ustat(0x0, &(0x7f00000000c0)) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 04:42:36 executing program 3: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000140)) 04:42:36 executing program 5: syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140)) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) 04:42:36 executing program 7: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) prctl$setendian(0x14, 0x0) 04:42:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) clock_gettime(0x0, &(0x7f0000000140)) 04:42:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000300)) 04:42:36 executing program 7: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) prctl$setendian(0x14, 0x0) 04:42:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) clock_gettime(0x0, &(0x7f0000000140)) 04:42:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) timer_delete(0x0) 04:42:37 executing program 3: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000140)) 04:42:37 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]}) ustat(0x0, &(0x7f00000000c0)) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 04:42:37 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6}]}) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8) socket$unix(0x1, 0x0, 0x0) 04:42:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000300)) 04:42:37 executing program 7: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) prctl$setendian(0x14, 0x0) 04:42:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) pipe(&(0x7f0000000000)) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) 04:42:37 executing program 5: syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140)) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) [ 703.435580] audit: type=1326 audit(1529728957.434:1166): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11440 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:37 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000300)}) ustat(0x0, &(0x7f00000000c0)) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 04:42:37 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50234}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000140)) 04:42:37 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) prctl$setendian(0x14, 0x0) 04:42:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000300)) 04:42:37 executing program 5: syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140)) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) [ 703.534645] audit: type=1326 audit(1529728957.454:1167): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11442 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpu.stat\x00', 0x0, 0x0) set_thread_area(&(0x7f0000000080)) 04:42:37 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50234}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000140)) 04:42:37 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000300)}) ustat(0x0, &(0x7f00000000c0)) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 04:42:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000300)}) ustat(0x0, &(0x7f00000000c0)) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 04:42:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000300)) 04:42:38 executing program 5: syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140)) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) 04:42:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6}]}) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8) socket$unix(0x1, 0x0, 0x0) 04:42:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f00000002c0)}) io_destroy(0x0) 04:42:38 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50234}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000140)) 04:42:38 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) prctl$setendian(0x14, 0x0) 04:42:38 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 04:42:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000300)) 04:42:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x50351}]}) ustat(0x0, &(0x7f00000000c0)) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 04:42:38 executing program 5: syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140)) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) [ 704.475349] audit: type=1326 audit(1529728958.473:1168): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11491 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000140)) 04:42:38 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) prctl$setendian(0x14, 0x0) 04:42:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f00000002c0)}) io_destroy(0x0) 04:42:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000300)) 04:42:38 executing program 5: syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022d}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140)) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) 04:42:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000140)) 04:42:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x50351}]}) ustat(0x0, &(0x7f00000000c0)) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 04:42:38 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 704.832759] audit: type=1326 audit(1529728958.831:1169): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11519 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x50351}]}) ustat(0x0, &(0x7f00000000c0)) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 04:42:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) prctl$setendian(0x14, 0x0) 04:42:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f00000002c0)}) io_destroy(0x0) 04:42:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]}) socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) 04:42:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000140)) 04:42:39 executing program 5: syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022d}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140)) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) 04:42:39 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 04:42:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50234}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000140)) 04:42:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6}]}) ustat(0x0, &(0x7f00000000c0)) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 04:42:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) prctl$setendian(0x14, 0x0) 04:42:39 executing program 5: syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022d}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140)) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) [ 705.588171] audit: type=1326 audit(1529728959.586:1170): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11556 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000300)) 04:42:39 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 04:42:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]}) socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) 04:42:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f00000002c0)}) io_destroy(0x0) 04:42:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50234}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000140)) 04:42:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) prctl$setendian(0x14, 0x0) 04:42:39 executing program 5: syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140)) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) [ 705.806908] audit: type=1326 audit(1529728959.805:1171): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11579 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50234}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000140)) 04:42:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) prctl$setendian(0x14, 0x0) [ 705.862660] audit: type=1326 audit(1529728959.832:1172): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11581 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:39 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 04:42:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) io_destroy(0x0) 04:42:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]}) socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) 04:42:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) prctl$setendian(0x14, 0x0) 04:42:40 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 04:42:40 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6}]}) ustat(0x0, &(0x7f00000000c0)) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 04:42:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) io_destroy(0x0) 04:42:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000300)) 04:42:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000140)) 04:42:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]}) socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) 04:42:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) prctl$setendian(0x14, 0x0) 04:42:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) io_destroy(0x0) 04:42:40 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 04:42:40 executing program 5: syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140)) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) [ 706.766150] kauditd_printk_skb: 1 callbacks suppressed [ 706.766171] audit: type=1326 audit(1529728960.764:1174): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11623 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) prctl$setendian(0x14, 0x0) 04:42:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]}) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) 04:42:40 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f00000002c0)}) io_destroy(0x0) [ 706.844498] audit: type=1326 audit(1529728960.802:1175): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11624 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 706.864375] audit: type=1326 audit(1529728960.824:1176): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11635 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:41 executing program 4: socket$inet6(0xa, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 706.956098] audit: type=1326 audit(1529728960.954:1177): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11638 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:41 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f00000002c0)}) io_destroy(0x0) 04:42:41 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]}) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) 04:42:41 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f00000002c0)}) io_destroy(0x0) 04:42:41 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6}]}) ustat(0x0, &(0x7f00000000c0)) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 04:42:41 executing program 4: socket$inet6(0xa, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 707.438871] audit: type=1326 audit(1529728961.437:1178): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11667 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:41 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f00000002c0)}) io_destroy(0x0) 04:42:41 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]}) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) 04:42:41 executing program 4: socket$inet6(0xa, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 04:42:41 executing program 5: syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140)) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) 04:42:41 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000140)) 04:42:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='status\x00') clone(0x0, &(0x7f0000000240), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000001240)) [ 707.777819] audit: type=1326 audit(1529728961.776:1179): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11679 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:41 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) prctl$setendian(0x14, 0x0) 04:42:41 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f00000002c0)}) io_destroy(0x0) [ 707.833690] audit: type=1326 audit(1529728961.801:1180): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11683 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:41 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) 04:42:41 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 707.981378] audit: type=1326 audit(1529728961.980:1181): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11700 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:42 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f00000002c0)}) io_destroy(0x0) 04:42:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='status\x00') clone(0x0, &(0x7f0000000240), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000001240)) 04:42:42 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) 04:42:42 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 04:42:42 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 04:42:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f00000002c0)}) io_destroy(0x0) 04:42:42 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) 04:42:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='status\x00') clone(0x0, &(0x7f0000000240), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000001240)) 04:42:42 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) getpgrp(0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000040)}, 0x20) 04:42:42 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040)) mlockall(0x0) 04:42:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000140)) 04:42:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f00000002c0)}) io_destroy(0x0) [ 708.747987] audit: type=1326 audit(1529728962.746:1182): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11755 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:42 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) prctl$setendian(0x14, 0x0) 04:42:42 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]}) socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) 04:42:42 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) socket$inet6(0xa, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 04:42:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='status\x00') clone(0x0, &(0x7f0000000240), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000001240)) 04:42:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5035a}]}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000140)) 04:42:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f00000002c0)}) io_destroy(0x0) 04:42:42 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040)) mlockall(0x0) [ 708.924129] audit: type=1326 audit(1529728962.922:1183): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11771 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:42 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]}) socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) 04:42:43 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50211}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f00000002c0)}) io_destroy(0x0) 04:42:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) clone(0x0, &(0x7f0000000240), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000001240)) 04:42:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040)) mlockall(0x0) 04:42:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5035a}]}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000140)) 04:42:43 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) socket$inet6(0xa, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 04:42:43 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]}) socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) 04:42:43 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) socket$inet6(0xa, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 04:42:43 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50211}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f00000002c0)}) io_destroy(0x0) 04:42:43 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 04:42:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040)) mlockall(0x0) 04:42:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) clone(0x0, &(0x7f0000000240), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000001240)) 04:42:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000300)}) socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) 04:42:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5035a}]}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000140)) 04:42:43 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f3}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)) recvmsg(0xffffffffffffff9c, &(0x7f0000000580)={&(0x7f00000000c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast1}}}, 0x80, &(0x7f0000000440), 0x0, &(0x7f00000004c0)=""/146, 0x92}, 0x0) 04:42:43 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000080)) 04:42:43 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50211}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f00000002c0)}) io_destroy(0x0) 04:42:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000300)}) socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) 04:42:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f00000002c0)}) io_destroy(0x0) 04:42:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) clone(0x0, &(0x7f0000000240), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000001240)) 04:42:44 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 04:42:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) mlockall(0x0) 04:42:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5035a}]}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000140)) 04:42:44 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000080)) 04:42:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) 04:42:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000300)}) socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) 04:42:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) mlockall(0x0) 04:42:44 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 04:42:44 executing program 2: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='status\x00') clone(0x0, &(0x7f0000000240), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000001240)) 04:42:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5035a}]}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000140)) 04:42:44 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000080)) 04:42:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) 04:42:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x50351}]}) socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) 04:42:44 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 04:42:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f00000002c0)}) io_destroy(0x0) 04:42:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) mlockall(0x0) 04:42:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5035a}]}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000140)) 04:42:44 executing program 2: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='status\x00') clone(0x0, &(0x7f0000000240), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000001240)) 04:42:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x50351}]}) socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) 04:42:44 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000080)) 04:42:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) 04:42:45 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x50351}]}) socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) 04:42:45 executing program 2: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='status\x00') clone(0x0, &(0x7f0000000240), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000001240)) 04:42:45 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000080)) 04:42:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5035a}]}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000140)) 04:42:45 executing program 0: ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040)) mlockall(0x0) 04:42:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) 04:42:45 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6}]}) socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) 04:42:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) 04:42:45 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 04:42:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f00000002c0)}) io_destroy(0x0) 04:42:45 executing program 0: ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040)) mlockall(0x0) 04:42:45 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000140)) 04:42:45 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000080)) 04:42:45 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='status\x00') clone(0x0, &(0x7f0000000240), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000001240)) 04:42:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) [ 711.964712] kauditd_printk_skb: 5 callbacks suppressed [ 711.964734] audit: type=1326 audit(1529728965.963:1189): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11956 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:46 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000140)) 04:42:46 executing program 0: ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040)) mlockall(0x0) 04:42:46 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000080)) 04:42:46 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='status\x00') clone(0x0, &(0x7f0000000240), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000001240)) 04:42:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) 04:42:46 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000140)) 04:42:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6}]}) socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) 04:42:46 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040)) mlockall(0x0) 04:42:46 executing program 3: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000080)) [ 712.318752] audit: type=1326 audit(1529728966.317:1190): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11988 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:46 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='status\x00') clone(0x0, &(0x7f0000000240), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000001240)) 04:42:46 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5035a}]}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000140)) 04:42:46 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 04:42:46 executing program 3: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000080)) 04:42:46 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040)) mlockall(0x0) 04:42:46 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='status\x00') clone(0x0, &(0x7f0000000240), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000001240)) 04:42:46 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) 04:42:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]}) ustat(0x0, &(0x7f00000000c0)) getpgrp(0x0) [ 712.919879] audit: type=1326 audit(1529728966.918:1191): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12012 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:46 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5035a}]}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000140)) 04:42:47 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) 04:42:47 executing program 3: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000080)) 04:42:47 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040)) mlockall(0x0) 04:42:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='status\x00') clone(0x0, &(0x7f0000000240), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000001240)) 04:42:47 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6}]}) socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) 04:42:47 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5035a}]}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000140)) 04:42:47 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]}) ustat(0x0, &(0x7f00000000c0)) getpgrp(0x0) 04:42:47 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) 04:42:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040)) mlockall(0x0) [ 713.343943] audit: type=1326 audit(1529728967.342:1192): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12047 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:47 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) 04:42:47 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000080)) 04:42:47 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000140)) 04:42:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040)) mlockall(0x0) 04:42:47 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]}) ustat(0x0, &(0x7f00000000c0)) getpgrp(0x0) 04:42:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='status\x00') clone(0x0, &(0x7f0000000240), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000001240)) 04:42:47 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f00000000c0)=""/121) 04:42:47 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) 04:42:47 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000140)) 04:42:47 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000080)) 04:42:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040)) mlockall(0x0) 04:42:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f00000000c0)=""/121) 04:42:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='status\x00') clone(0x0, &(0x7f0000000240), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000001240)) 04:42:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000001c0)={'ipvs\x00'}, &(0x7f0000000200)=0x1e) 04:42:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000140)) 04:42:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022d}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040)) mlockall(0x0) 04:42:48 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000080)) 04:42:48 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) 04:42:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) 04:42:48 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000080)) 04:42:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022d}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040)) mlockall(0x0) 04:42:48 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) 04:42:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5035a}]}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000140)) 04:42:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000001c0)={'ipvs\x00'}, &(0x7f0000000200)=0x1e) 04:42:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f00000000c0)=""/121) 04:42:48 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000080)) 04:42:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022d}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040)) mlockall(0x0) 04:42:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) 04:42:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='status\x00') clone(0x0, &(0x7f0000000240), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000001240)) 04:42:48 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) 04:42:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5035a}]}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000140)) 04:42:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000001c0)={'ipvs\x00'}, &(0x7f0000000200)=0x1e) 04:42:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040)) mlockall(0x0) 04:42:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f00000000c0)=""/121) 04:42:48 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000080)) 04:42:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5035a}]}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000140)) 04:42:48 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) 04:42:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) [ 714.891856] audit: type=1326 audit(1529728968.890:1193): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12163 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000001c0)={'ipvs\x00'}, &(0x7f0000000200)=0x1e) 04:42:49 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000080)) 04:42:49 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f00000000c0)=""/121) 04:42:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='status\x00') clone(0x0, &(0x7f0000000240), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000001240)) 04:42:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50211}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) 04:42:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000140)) 04:42:49 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) 04:42:49 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000080)) [ 715.243293] audit: type=1326 audit(1529728969.242:1194): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12195 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000001c0)={'ipvs\x00'}, &(0x7f0000000200)=0x1e) 04:42:49 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f00000000c0)=""/121) 04:42:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040)) mlockall(0x0) 04:42:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50211}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) 04:42:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='status\x00') clone(0x0, &(0x7f0000000240), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000001240)) 04:42:49 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) 04:42:49 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000080)) 04:42:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000001c0)={'ipvs\x00'}, &(0x7f0000000200)=0x1e) 04:42:49 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f00000000c0)=""/121) [ 715.810123] audit: type=1326 audit(1529728969.807:1195): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12216 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50211}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) 04:42:49 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000080)) [ 715.882989] audit: type=1326 audit(1529728969.837:1196): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12220 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:49 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) 04:42:49 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f00000000c0)=""/121) [ 716.044415] audit: type=1326 audit(1529728970.043:1197): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12236 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000140)) 04:42:50 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000001c0)={'ipvs\x00'}, &(0x7f0000000200)=0x1e) 04:42:50 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f00000000c0)=""/121) 04:42:50 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) 04:42:50 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) [ 716.175857] audit: type=1326 audit(1529728970.174:1198): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12247 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040)) mlockall(0x0) 04:42:50 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f00000000c0)=""/121) 04:42:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='status\x00') clone(0x0, &(0x7f0000000240), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000001240)) 04:42:50 executing program 6: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000001c0)={'ipvs\x00'}, &(0x7f0000000200)=0x1e) 04:42:50 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) 04:42:50 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f00000000c0)=""/121) 04:42:50 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) 04:42:50 executing program 6: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000001c0)={'ipvs\x00'}, &(0x7f0000000200)=0x1e) 04:42:50 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000080)) 04:42:50 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f00000000c0)=""/121) 04:42:51 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) [ 717.011661] kauditd_printk_skb: 3 callbacks suppressed [ 717.011685] audit: type=1326 audit(1529728971.010:1202): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12292 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000140)) 04:42:51 executing program 6: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000001c0)={'ipvs\x00'}, &(0x7f0000000200)=0x1e) 04:42:51 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f00000000c0)=""/121) 04:42:51 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) 04:42:51 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) [ 717.198740] audit: type=1326 audit(1529728971.196:1203): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12306 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 717.240523] audit: type=1326 audit(1529728971.217:1204): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12309 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:51 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000001c0)={'ipvs\x00'}, &(0x7f0000000200)=0x1e) 04:42:51 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) 04:42:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='status\x00') clone(0x0, &(0x7f0000000240), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000001240)) 04:42:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f00000000c0)=""/121) 04:42:51 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x0, 0x0) 04:42:51 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) 04:42:51 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000001c0)={'ipvs\x00'}, &(0x7f0000000200)=0x1e) 04:42:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f00000000c0)=""/121) [ 717.859256] audit: type=1326 audit(1529728971.857:1205): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12335 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:51 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000080)) 04:42:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) 04:42:51 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000001c0)={'ipvs\x00'}, &(0x7f0000000200)=0x1e) [ 718.029036] audit: type=1326 audit(1529728972.026:1206): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12350 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) 04:42:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f00000000c0)=""/121) 04:42:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]}) ustat(0x0, &(0x7f00000000c0)) keyctl$clear(0x7, 0x0) 04:42:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000001c0)={'ipvs\x00'}, &(0x7f0000000200)=0x1e) 04:42:52 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) 04:42:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000240), 0x4) [ 718.213502] audit: type=1326 audit(1529728972.212:1207): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12359 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f00000000c0)=""/121) 04:42:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f00000000c0)=""/121) 04:42:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000001c0)={'ipvs\x00'}, &(0x7f0000000200)=0x1e) 04:42:52 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) 04:42:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]}) ustat(0x0, &(0x7f00000000c0)) keyctl$clear(0x7, 0x0) 04:42:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000240), 0x4) 04:42:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000100)) 04:42:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]}) ustat(0x0, &(0x7f00000000c0)) keyctl$clear(0x7, 0x0) 04:42:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000001c0)={'ipvs\x00'}, &(0x7f0000000200)=0x1e) 04:42:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f00000000c0)=""/121) 04:42:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000180)={'ifb0\x00', {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}) 04:42:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) 04:42:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000240), 0x4) 04:42:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000100)) 04:42:53 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f00000000c0)=""/121) 04:42:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) memfd_create(&(0x7f0000000140)='(%wlan0eth1\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000000c0)) 04:42:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000001c0)={'ipvs\x00'}, &(0x7f0000000200)=0x1e) 04:42:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]}) ustat(0x0, &(0x7f00000000c0)) keyctl$clear(0x7, 0x0) [ 719.178006] audit: type=1326 audit(1529728973.176:1208): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12415 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000001c0)={'ipvs\x00'}, &(0x7f0000000200)=0x1e) 04:42:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) 04:42:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000240), 0x4) 04:42:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]}) keyctl$clear(0x7, 0x0) 04:42:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) memfd_create(&(0x7f0000000140)='(%wlan0eth1\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000000c0)) 04:42:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000100)) 04:42:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000180)={'ifb0\x00', {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}) 04:42:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) 04:42:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000001c0)={'ipvs\x00'}, &(0x7f0000000200)=0x1e) 04:42:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000240), 0x4) 04:42:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]}) keyctl$clear(0x7, 0x0) 04:42:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) memfd_create(&(0x7f0000000140)='(%wlan0eth1\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000000c0)) 04:42:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000180)={'ifb0\x00', {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}) 04:42:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000100)) 04:42:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000240), 0x4) 04:42:54 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) 04:42:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) memfd_create(&(0x7f0000000140)='(%wlan0eth1\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000000c0)) 04:42:54 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f00000000c0)=""/121) 04:42:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]}) keyctl$clear(0x7, 0x0) 04:42:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000001c0)={'ipvs\x00'}, &(0x7f0000000200)=0x1e) [ 720.105225] audit: type=1326 audit(1529728974.103:1209): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12480 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 720.166833] audit: type=1326 audit(1529728974.154:1210): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12491 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000240), 0x4) [ 720.231519] audit: type=1326 audit(1529728974.199:1211): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12482 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000100)) 04:42:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000180)={'ifb0\x00', {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}) 04:42:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000000c0)) 04:42:54 executing program 0: ustat(0x0, &(0x7f00000000c0)) keyctl$clear(0x7, 0x0) 04:42:54 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000240), 0x4) 04:42:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000180)={'ifb0\x00', {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}) 04:42:54 executing program 0: ustat(0x0, &(0x7f00000000c0)) keyctl$clear(0x7, 0x0) 04:42:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000100)) 04:42:55 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f00000000c0)=""/121) 04:42:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000000c0)) 04:42:55 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000240), 0x4) 04:42:55 executing program 0: ustat(0x0, &(0x7f00000000c0)) keyctl$clear(0x7, 0x0) 04:42:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000180)={'ifb0\x00', {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}) 04:42:55 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000100)) 04:42:55 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) 04:42:55 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000001c0)={'ipvs\x00'}, &(0x7f0000000200)=0x1e) 04:42:55 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]}) ustat(0x0, &(0x7f00000000c0)) keyctl$clear(0x7, 0x0) 04:42:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000000c0)) 04:42:55 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000240), 0x4) 04:42:55 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000100)) 04:42:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000180)={'ifb0\x00', {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}) 04:42:55 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]}) ustat(0x0, &(0x7f00000000c0)) keyctl$clear(0x7, 0x0) 04:42:55 executing program 2: memfd_create(&(0x7f0000000140)='(%wlan0eth1\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000000c0)) 04:42:55 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000240), 0x4) 04:42:56 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000001c0)={'ipvs\x00'}, &(0x7f0000000200)=0x1e) 04:42:56 executing program 3: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000180)={'ifb0\x00', {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}) 04:42:56 executing program 2: memfd_create(&(0x7f0000000140)='(%wlan0eth1\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000000c0)) 04:42:56 executing program 7: openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000100)) 04:42:56 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000240), 0x4) 04:42:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) 04:42:56 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]}) ustat(0x0, &(0x7f00000000c0)) keyctl$clear(0x7, 0x0) 04:42:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpu.stat\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000080)) [ 722.112819] kauditd_printk_skb: 3 callbacks suppressed [ 722.112843] audit: type=1326 audit(1529728976.111:1215): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12587 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:56 executing program 2: memfd_create(&(0x7f0000000140)='(%wlan0eth1\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000000c0)) 04:42:56 executing program 3: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000180)={'ifb0\x00', {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}) 04:42:56 executing program 7: openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000100)) 04:42:56 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000240), 0x4) 04:42:56 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000300)}) ustat(0x0, &(0x7f00000000c0)) keyctl$clear(0x7, 0x0) [ 722.256440] audit: type=1326 audit(1529728976.137:1216): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12589 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpu.stat\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000080)) 04:42:56 executing program 3: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000180)={'ifb0\x00', {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}) 04:42:56 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) memfd_create(&(0x7f0000000140)='(%wlan0eth1\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000000c0)) 04:42:57 executing program 7: openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000100)) 04:42:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000240), 0x4) 04:42:57 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000180)={'ifb0\x00', {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}) 04:42:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000300)}) ustat(0x0, &(0x7f00000000c0)) keyctl$clear(0x7, 0x0) 04:42:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpu.stat\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000080)) 04:42:57 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) memfd_create(&(0x7f0000000140)='(%wlan0eth1\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000000c0)) 04:42:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) pipe2(&(0x7f0000000000), 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000040)=""/5) 04:42:57 executing program 1: 04:42:57 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000100)) 04:42:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) seccomp(0x0, 0x0, &(0x7f0000000080)) exit(0x0) 04:42:57 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000180)={'ifb0\x00', {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}) 04:42:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000300)}) ustat(0x0, &(0x7f00000000c0)) keyctl$clear(0x7, 0x0) 04:42:57 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) memfd_create(&(0x7f0000000140)='(%wlan0eth1\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000000c0)) 04:42:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000240), 0x4) 04:42:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpu.stat\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000080)) 04:42:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) pipe2(&(0x7f0000000000), 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000040)=""/5) 04:42:57 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000100)) 04:42:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x50351}]}) ustat(0x0, &(0x7f00000000c0)) keyctl$clear(0x7, 0x0) 04:42:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000240), 0x4) 04:42:57 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000180)={'ifb0\x00', {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}) 04:42:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) memfd_create(&(0x7f0000000140)='(%wlan0eth1\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000000c0)) 04:42:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000080)) 04:42:57 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000100)) 04:42:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) pipe2(&(0x7f0000000000), 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000040)=""/5) 04:42:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50345}]}) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000040)) geteuid() 04:42:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000180)={'ifb0\x00', {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}) 04:42:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x50351}]}) ustat(0x0, &(0x7f00000000c0)) keyctl$clear(0x7, 0x0) 04:42:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000240), 0x4) 04:42:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) memfd_create(&(0x7f0000000140)='(%wlan0eth1\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000000c0)) 04:42:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000080)) 04:42:57 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000100)) 04:42:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000180)={'ifb0\x00', {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}) 04:42:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x50351}]}) ustat(0x0, &(0x7f00000000c0)) keyctl$clear(0x7, 0x0) 04:42:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) pipe2(&(0x7f0000000000), 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000040)=""/5) 04:42:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000240), 0x4) 04:42:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) memfd_create(&(0x7f0000000140)='(%wlan0eth1\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000000c0)) 04:42:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50345}]}) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000040)) geteuid() 04:42:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000100)) 04:42:58 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000080)) 04:42:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000180)={'ifb0\x00', {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}) 04:42:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6}]}) ustat(0x0, &(0x7f00000000c0)) keyctl$clear(0x7, 0x0) 04:42:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]}) memfd_create(&(0x7f0000000140)='(%wlan0eth1\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000000c0)) 04:42:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000240), 0x4) 04:42:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000040)=""/5) 04:42:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000100)) [ 724.249677] audit: type=1326 audit(1529728978.248:1217): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12743 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50345}]}) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000040)) geteuid() 04:42:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000180)={'ifb0\x00', {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}) 04:42:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]}) memfd_create(&(0x7f0000000140)='(%wlan0eth1\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000000c0)) 04:42:58 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpu.stat\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000080)) 04:42:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000100)) 04:42:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000240), 0x4) 04:42:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000040)=""/5) 04:42:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50345}]}) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000040)) geteuid() [ 724.583528] audit: type=1326 audit(1529728978.582:1218): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12777 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000180)={'ifb0\x00', {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}) 04:42:58 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpu.stat\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000080)) 04:42:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]}) memfd_create(&(0x7f0000000140)='(%wlan0eth1\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000000c0)) 04:42:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50345}]}) geteuid() 04:42:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) memfd_create(&(0x7f0000000140)='(%wlan0eth1\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000000c0)) 04:42:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000100)) 04:42:59 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpu.stat\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000080)) 04:42:59 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000040)=""/5) 04:42:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000180)={'ifb0\x00', {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}) 04:42:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6}]}) ustat(0x0, &(0x7f00000000c0)) keyctl$clear(0x7, 0x0) 04:42:59 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpu.stat\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000080)) [ 725.177714] audit: type=1326 audit(1529728979.176:1219): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12806 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000100)) 04:42:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000180)={'ifb0\x00', {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}) [ 725.258782] audit: type=1326 audit(1529728979.243:1220): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12814 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 725.363469] audit: type=1326 audit(1529728979.361:1221): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12823 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:59 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000240), 0x4) 04:42:59 executing program 6: pipe2(&(0x7f0000000000), 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000040)=""/5) 04:42:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50345}]}) geteuid() 04:42:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000100)) 04:42:59 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpu.stat\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000080)) [ 725.493925] audit: type=1326 audit(1529728979.492:1222): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12830 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:59 executing program 6: pipe2(&(0x7f0000000000), 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000040)=""/5) 04:42:59 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpu.stat\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000080)) [ 725.554117] audit: type=1326 audit(1529728979.536:1223): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12838 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:00 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6}]}) ustat(0x0, &(0x7f00000000c0)) keyctl$clear(0x7, 0x0) 04:43:00 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50345}]}) geteuid() 04:43:00 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpu.stat\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000080)) 04:43:00 executing program 6: pipe2(&(0x7f0000000000), 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000040)=""/5) 04:43:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) memfd_create(&(0x7f0000000140)='(%wlan0eth1\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000000c0)) 04:43:00 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpu.stat\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000080)) [ 726.187906] audit: type=1326 audit(1529728980.183:1224): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12854 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:00 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) pipe2(&(0x7f0000000000), 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000040)=""/5) 04:43:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000180)={'ifb0\x00', {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}) 04:43:00 executing program 1: ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000040)) geteuid() 04:43:00 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000240), 0x4) 04:43:00 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpu.stat\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000080)) 04:43:00 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) pipe2(&(0x7f0000000000), 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000040)=""/5) 04:43:00 executing program 1: ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000040)) geteuid() 04:43:00 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000100)) 04:43:00 executing program 1: ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000040)) geteuid() 04:43:00 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) pipe2(&(0x7f0000000000), 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000040)=""/5) 04:43:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) memfd_create(&(0x7f0000000140)='(%wlan0eth1\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000000c0)) 04:43:01 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50345}]}) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000040)) geteuid() 04:43:01 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000000), 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000040)=""/5) 04:43:01 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpu.stat\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000080)) 04:43:01 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040)) ioprio_get$pid(0x0, 0x0) [ 727.163240] kauditd_printk_skb: 4 callbacks suppressed [ 727.163262] audit: type=1326 audit(1529728981.161:1229): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12910 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:01 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpu.stat\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000080)) 04:43:01 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000000), 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000040)=""/5) 04:43:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000180)={'ifb0\x00', {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}) 04:43:01 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50345}]}) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000040)) geteuid() [ 727.368720] audit: type=1326 audit(1529728981.367:1230): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12932 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:01 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000100)) 04:43:01 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpu.stat\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000080)) 04:43:01 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50345}]}) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000040)) geteuid() 04:43:01 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000000), 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000040)=""/5) 04:43:01 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040)) ioprio_get$pid(0x0, 0x0) 04:43:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) pipe2(&(0x7f00000000c0), 0x0) getpgid(0x0) [ 727.559024] audit: type=1326 audit(1529728981.557:1231): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12940 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:01 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpu.stat\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000080)) [ 727.664094] audit: type=1326 audit(1529728981.662:1232): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12954 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) pipe(&(0x7f0000000000)) clock_gettime(0x0, &(0x7f0000000140)) 04:43:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000040)) geteuid() 04:43:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) pipe2(&(0x7f0000000000), 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000040)=""/5) 04:43:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040)) ioprio_get$pid(0x0, 0x0) 04:43:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.type\x00', 0x2, 0x0) syz_fuseblk_mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 04:43:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000040)) geteuid() 04:43:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) pipe2(&(0x7f0000000000), 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000040)=""/5) 04:43:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000740)}, &(0x7f0000000480)) 04:43:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040)) ioprio_get$pid(0x0, 0x0) 04:43:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) removexattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@random={'btrfs.', '/dev/uinput\x00'}) 04:43:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000040)) geteuid() 04:43:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) pipe2(&(0x7f0000000000), 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000040)=""/5) 04:43:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x0) mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='sysfs\x00', 0x0, &(0x7f00000002c0)) 04:43:02 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000140)}) 04:43:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000740)}, &(0x7f0000000480)) 04:43:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpu.stat\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000080)) 04:43:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) ioprio_get$pid(0x0, 0x0) 04:43:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x50345}]}) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000040)) geteuid() 04:43:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000000), 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000040)=""/5) 04:43:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) removexattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@random={'btrfs.', '/dev/uinput\x00'}) 04:43:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040), 0x20) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) [ 728.692281] audit: type=1326 audit(1529728982.690:1233): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13014 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:02 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000140)}) 04:43:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x50345}]}) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000040)) geteuid() [ 728.785418] audit: type=1326 audit(1529728982.783:1234): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13022 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) ioprio_get$pid(0x0, 0x0) 04:43:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000740)}, &(0x7f0000000480)) 04:43:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) removexattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@random={'btrfs.', '/dev/uinput\x00'}) 04:43:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x50345}]}) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000040)) geteuid() 04:43:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000140)}) 04:43:03 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040), 0x20) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 04:43:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) ioprio_get$pid(0x0, 0x0) 04:43:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000740)}, &(0x7f0000000480)) [ 729.321131] ================================================================== [ 729.328656] BUG: KMSAN: uninit-value in rcu_segcblist_enqueue+0x239/0x2d0 [ 729.335582] CPU: 1 PID: 0 Comm: swapper/1 Not tainted 4.17.0+ #9 [ 729.341717] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 729.351065] Call Trace: [ 729.353644] [ 729.355805] dump_stack+0x185/0x1d0 [ 729.360226] kmsan_report+0x188/0x2a0 [ 729.364030] __msan_warning_32+0x70/0xc0 [ 729.368083] rcu_segcblist_enqueue+0x239/0x2d0 [ 729.372649] __call_rcu+0x227/0xef0 [ 729.376260] ? __d_free+0x66/0x80 [ 729.379696] ? __put_cred+0x180/0x180 [ 729.383481] call_rcu_sched+0x32/0x40 [ 729.387267] __put_cred+0x102/0x180 [ 729.390880] file_free_rcu+0xc7/0x150 [ 729.394676] ? put_filp+0x160/0x160 [ 729.398282] rcu_process_callbacks+0x18dd/0x2060 [ 729.403026] ? rcu_scheduler_starting+0xe0/0xe0 [ 729.407701] __do_softirq+0x592/0x979 [ 729.411486] irq_exit+0x202/0x240 [ 729.414919] exiting_irq+0xe/0x10 [ 729.418354] smp_apic_timer_interrupt+0x64/0x90 [ 729.423014] apic_timer_interrupt+0xf/0x20 [ 729.427232] [ 729.429458] RIP: 0010:default_idle+0x20b/0x3e0 [ 729.434023] RSP: 0018:ffff8801d8e5fdf0 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 [ 729.441729] RAX: ffff8801fd432f18 RBX: 0000000000000000 RCX: ffff880000000000 [ 729.448999] RDX: ffff8801fd032f18 RSI: aaaaaaaaaaaab000 RDI: ffffea0000000000 [ 729.456599] RBP: ffff8801d8e5fe28 R08: 0000000001080020 R09: 0000000000000002 [ 729.463858] R10: 0000000000000000 R11: ffffffff89fef830 R12: ffff8801d8e5fe8f [ 729.471115] R13: ffff8801d8da57c0 R14: ffff8801d8e5fe8c R15: ffff8801d8da6098 [ 729.478388] ? __cpuidle_text_start+0x8/0x8 [ 729.482723] ? __cpuidle_text_start+0x8/0x8 [ 729.487041] arch_cpu_idle+0x26/0x30 [ 729.490744] do_idle+0x36d/0x830 [ 729.494100] cpu_startup_entry+0x45/0x50 [ 729.498143] ? setup_APIC_timer+0x220/0x220 [ 729.502457] start_secondary+0x3c6/0x490 [ 729.506621] secondary_startup_64+0xa5/0xb0 [ 729.510931] [ 729.512546] Uninit was stored to memory at: [ 729.516850] kmsan_internal_chain_origin+0x12b/0x210 [ 729.521931] __msan_chain_origin+0x69/0xc0 [ 729.526150] rcu_segcblist_enqueue+0x275/0x2d0 [ 729.530725] __call_rcu+0x227/0xef0 [ 729.534357] call_rcu_sched+0x32/0x40 [ 729.538138] release_task+0x24b9/0x2530 [ 729.542100] do_exit+0x2e11/0x3930 [ 729.545637] do_group_exit+0x1a0/0x360 [ 729.549504] get_signal+0x1405/0x1ec0 [ 729.553554] do_signal+0xb8/0x1d20 [ 729.557085] prepare_exit_to_usermode+0x271/0x3a0 [ 729.561939] syscall_return_slowpath+0xe9/0x710 [ 729.566699] do_syscall_64+0x1ad/0x230 [ 729.570572] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 729.575745] [ 729.577379] Uninit was created at: [ 729.581193] kmsan_internal_poison_shadow+0xb8/0x1b0 [ 729.586295] kmsan_kmalloc+0x94/0x100 [ 729.590100] kmem_cache_alloc+0xa97/0xb70 [ 729.594243] alloc_pid+0x7f/0xce0 [ 729.597699] copy_process+0x3fbb/0x9be0 [ 729.601673] _do_fork+0x353/0xf60 [ 729.605124] __x64_sys_clone+0x15e/0x1b0 [ 729.609184] do_syscall_64+0x15b/0x230 [ 729.613073] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 729.618246] ================================================================== [ 729.625595] Disabling lock debugging due to kernel taint [ 729.631035] Kernel panic - not syncing: panic_on_warn set ... [ 729.631035] [ 729.638392] CPU: 1 PID: 0 Comm: swapper/1 Tainted: G B 4.17.0+ #9 [ 729.645925] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 729.655355] Call Trace: [ 729.657915] [ 729.660059] dump_stack+0x185/0x1d0 [ 729.663685] panic+0x3d0/0x990 [ 729.666894] kmsan_report+0x29e/0x2a0 [ 729.670694] __msan_warning_32+0x70/0xc0 [ 729.674751] rcu_segcblist_enqueue+0x239/0x2d0 [ 729.679325] __call_rcu+0x227/0xef0 [ 729.682934] ? __d_free+0x66/0x80 [ 729.686376] ? __put_cred+0x180/0x180 [ 729.690175] call_rcu_sched+0x32/0x40 [ 729.693966] __put_cred+0x102/0x180 [ 729.697582] file_free_rcu+0xc7/0x150 [ 729.701365] ? put_filp+0x160/0x160 [ 729.704972] rcu_process_callbacks+0x18dd/0x2060 [ 729.709721] ? rcu_scheduler_starting+0xe0/0xe0 [ 729.714373] __do_softirq+0x592/0x979 [ 729.718157] irq_exit+0x202/0x240 [ 729.721592] exiting_irq+0xe/0x10 [ 729.725034] smp_apic_timer_interrupt+0x64/0x90 [ 729.729705] apic_timer_interrupt+0xf/0x20 [ 729.733913] [ 729.736130] RIP: 0010:default_idle+0x20b/0x3e0 [ 729.740685] RSP: 0018:ffff8801d8e5fdf0 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 [ 729.748371] RAX: ffff8801fd432f18 RBX: 0000000000000000 RCX: ffff880000000000 [ 729.755621] RDX: ffff8801fd032f18 RSI: aaaaaaaaaaaab000 RDI: ffffea0000000000 [ 729.762870] RBP: ffff8801d8e5fe28 R08: 0000000001080020 R09: 0000000000000002 [ 729.770118] R10: 0000000000000000 R11: ffffffff89fef830 R12: ffff8801d8e5fe8f [ 729.777364] R13: ffff8801d8da57c0 R14: ffff8801d8e5fe8c R15: ffff8801d8da6098 [ 729.784617] ? __cpuidle_text_start+0x8/0x8 [ 729.788918] ? __cpuidle_text_start+0x8/0x8 [ 729.793219] arch_cpu_idle+0x26/0x30 [ 729.796912] do_idle+0x36d/0x830 [ 729.800257] cpu_startup_entry+0x45/0x50 [ 729.804296] ? setup_APIC_timer+0x220/0x220 [ 729.808682] start_secondary+0x3c6/0x490 [ 729.812723] secondary_startup_64+0xa5/0xb0 [ 729.817570] Dumping ftrace buffer: [ 729.821092] (ftrace buffer empty) [ 729.824796] Kernel Offset: disabled [ 729.828412] Rebooting in 86400 seconds..