ckname(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @dev}}}, &(0x7f0000000080)=0x80)
setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f00000000c0), 0x4)
04:39:23 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]})
seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)})
ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000040))
04:39:24 executing program 3:
seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050253}]})
seccomp(0x0, 0x0, &(0x7f0000000040))
stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0))
[ 509.958795] audit: type=1326 audit(1529728763.957:700): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=32183 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:39:24 executing program 3:
seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050253}]})
seccomp(0x0, 0x0, &(0x7f0000000040))
stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0))
04:39:24 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)})
seccomp(0x0, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)})
ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000080))
04:39:24 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]})
add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0)
04:39:24 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000200))
04:39:24 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023e}]})
seccomp(0x0, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)})
ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000080))
04:39:24 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]})
setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f00000000c0), 0x4)
04:39:24 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]})
seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)})
ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000040))
04:39:24 executing program 3:
seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050253}]})
seccomp(0x0, 0x0, &(0x7f0000000040))
stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0))
04:39:24 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]})
shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil)
ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}})
04:39:24 executing program 6:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]})
pipe2(&(0x7f0000000000), 0x0)
ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040))
04:39:24 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]})
add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0)
04:39:24 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000200))
04:39:24 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)})
seccomp(0x0, 0x0, &(0x7f0000000040))
stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0))
04:39:24 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023e}]})
seccomp(0x0, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)})
ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000080))
04:39:24 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]})
setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f00000000c0), 0x4)
04:39:24 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]})
seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)})
ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000040))
04:39:24 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]})
shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil)
ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}})
[ 510.935688] audit: type=1326 audit(1529728764.934:701): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=32252 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:39:25 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]})
setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f00000000c0), 0x4)
04:39:25 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023e}]})
seccomp(0x0, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)})
ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000080))
04:39:25 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)})
seccomp(0x0, 0x0, &(0x7f0000000040))
stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0))
04:39:25 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]})
seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)})
ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000040))
04:39:25 executing program 0:
shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil)
add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0)
04:39:25 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000200))
04:39:25 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]})
shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil)
ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}})
04:39:25 executing program 2:
getsockname(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @dev}}}, &(0x7f0000000080)=0x80)
setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f00000000c0), 0x4)
04:39:25 executing program 6:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]})
pipe2(&(0x7f0000000000), 0x0)
ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040))
04:39:25 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]})
seccomp(0x0, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)})
ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000080))
04:39:25 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)})
seccomp(0x0, 0x0, &(0x7f0000000040))
stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0))
04:39:25 executing program 0:
shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil)
add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0)
04:39:25 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]})
ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000040))
04:39:25 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000200))
04:39:25 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]})
shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil)
ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}})
04:39:25 executing program 2:
getsockname(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @dev}}}, &(0x7f0000000080)=0x80)
setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f00000000c0), 0x4)
[ 511.884826] audit: type=1326 audit(1529728765.883:702): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=32292 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:39:25 executing program 0:
shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil)
add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0)
04:39:26 executing program 2:
getsockname(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @dev}}}, &(0x7f0000000080)=0x80)
setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f00000000c0), 0x4)
[ 511.952094] audit: type=1326 audit(1529728765.933:703): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=32301 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:39:26 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x40000000050253}]})
seccomp(0x0, 0x0, &(0x7f0000000040))
stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0))
04:39:26 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]})
ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000040))
04:39:26 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]})
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000200))
04:39:26 executing program 0:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]})
shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil)
add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0)
04:39:26 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]})
ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}})
04:39:26 executing program 2:
seccomp(0x0, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]})
getsockname(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @dev}}}, &(0x7f0000000080)=0x80)
setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f00000000c0), 0x4)
04:39:26 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]})
seccomp(0x0, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)})
ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000080))
04:39:26 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x40000000050253}]})
seccomp(0x0, 0x0, &(0x7f0000000040))
stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0))
04:39:26 executing program 0:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]})
shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil)
add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0)
04:39:26 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]})
ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000040))
04:39:26 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]})
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000200))
04:39:26 executing program 2:
seccomp(0x0, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]})
getsockname(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @dev}}}, &(0x7f0000000080)=0x80)
setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f00000000c0), 0x4)
04:39:26 executing program 6:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5021a}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0)
msgrcv(0x0, &(0x7f0000000040)={0x0, ""/27}, 0x23, 0x0, 0x0)
04:39:26 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]})
ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}})
[ 512.881139] audit: type=1326 audit(1529728766.879:704): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=32336 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:39:26 executing program 2:
seccomp(0x0, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]})
getsockname(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @dev}}}, &(0x7f0000000080)=0x80)
setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f00000000c0), 0x4)
04:39:26 executing program 0:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]})
shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil)
add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0)
04:39:27 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x40000000050253}]})
seccomp(0x0, 0x0, &(0x7f0000000040))
stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0))
04:39:27 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]})
ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}})
04:39:27 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)})
ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000040))
04:39:27 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]})
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000200))
04:39:27 executing program 6:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5021a}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0)
msgrcv(0x0, &(0x7f0000000040)={0x0, ""/27}, 0x23, 0x0, 0x0)
04:39:27 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000140)})
getsockname(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @dev}}}, &(0x7f0000000080)=0x80)
setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f00000000c0), 0x4)
04:39:27 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]})
seccomp(0x0, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)})
ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000080))
04:39:27 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]})
seccomp(0x0, 0x0, &(0x7f0000000040))
stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0))
04:39:27 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)})
ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000040))
04:39:27 executing program 6:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5021a}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0)
msgrcv(0x0, &(0x7f0000000040)={0x0, ""/27}, 0x23, 0x0, 0x0)
04:39:27 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000140)})
getsockname(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @dev}}}, &(0x7f0000000080)=0x80)
setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f00000000c0), 0x4)
04:39:27 executing program 5:
openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000200))
04:39:27 executing program 4:
shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil)
ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}})
04:39:27 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)})
shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil)
add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0)
[ 513.820525] audit: type=1326 audit(1529728767.819:705): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=32386 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:39:27 executing program 5:
openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000200))
04:39:27 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000140)})
getsockname(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @dev}}}, &(0x7f0000000080)=0x80)
setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f00000000c0), 0x4)
04:39:27 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)})
ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000040))
[ 513.883778] audit: type=1326 audit(1529728767.867:706): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=32401 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:39:27 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)})
shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil)
add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0)
04:39:27 executing program 4:
shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil)
ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}})
04:39:28 executing program 6:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5021a}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0)
msgrcv(0x0, &(0x7f0000000040)={0x0, ""/27}, 0x23, 0x0, 0x0)
04:39:28 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5022b}]})
getsockname(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @dev}}}, &(0x7f0000000080)=0x80)
setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f00000000c0), 0x4)
04:39:28 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]})
seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)})
ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000040))
04:39:28 executing program 5:
openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000200))
04:39:28 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]})
seccomp(0x0, 0x0, &(0x7f0000000040))
stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0))
04:39:28 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)})
shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil)
add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0)
04:39:28 executing program 4:
shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil)
ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}})
04:39:28 executing program 6:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5021a}]})
msgrcv(0x0, &(0x7f0000000040)={0x0, ""/27}, 0x23, 0x0, 0x0)
04:39:28 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5022b}]})
getsockname(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @dev}}}, &(0x7f0000000080)=0x80)
setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f00000000c0), 0x4)
04:39:28 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]})
seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)})
ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000040))
04:39:28 executing program 5:
seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000200))
04:39:28 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050253}]})
seccomp(0x0, 0x0, &(0x7f0000000040))
openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0)
[ 514.812620] audit: type=1326 audit(1529728768.811:707): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=32444 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:39:28 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501df}]})
shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil)
add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0)
04:39:28 executing program 4:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]})
shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil)
ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}})
04:39:28 executing program 5:
seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000200))
04:39:28 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]})
seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)})
ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000040))
04:39:28 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5022b}]})
getsockname(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @dev}}}, &(0x7f0000000080)=0x80)
setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f00000000c0), 0x4)
04:39:29 executing program 6:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5021a}]})
msgrcv(0x0, &(0x7f0000000040)={0x0, ""/27}, 0x23, 0x0, 0x0)
04:39:29 executing program 5:
seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000200))
04:39:29 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000140)})
seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)})
ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000040))
04:39:29 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]})
seccomp(0x0, 0x0, &(0x7f0000000040))
stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0))
04:39:29 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501df}]})
shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil)
add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0)
04:39:29 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050253}]})
seccomp(0x0, 0x0, &(0x7f0000000040))
openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0)
04:39:29 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6}]})
getsockname(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @dev}}}, &(0x7f0000000080)=0x80)
setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f00000000c0), 0x4)
04:39:29 executing program 4:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]})
shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil)
ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}})
04:39:29 executing program 6:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5021a}]})
msgrcv(0x0, &(0x7f0000000040)={0x0, ""/27}, 0x23, 0x0, 0x0)
04:39:29 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000200))
04:39:29 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000140)})
seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)})
ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000040))
[ 515.752214] audit: type=1326 audit(1529728769.750:708): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=32490 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:39:29 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000140)})
seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)})
ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000040))
[ 515.811416] audit: type=1326 audit(1529728769.780:709): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=32494 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:39:29 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501df}]})
shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil)
add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0)
04:39:29 executing program 6:
openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0)
msgrcv(0x0, &(0x7f0000000040)={0x0, ""/27}, 0x23, 0x0, 0x0)
04:39:29 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000200))
04:39:29 executing program 4:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]})
shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil)
ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}})
04:39:30 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050253}]})
seccomp(0x0, 0x0, &(0x7f0000000040))
openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0)
04:39:30 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5022b}]})
seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)})
ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000040))
04:39:30 executing program 6:
openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0)
msgrcv(0x0, &(0x7f0000000040)={0x0, ""/27}, 0x23, 0x0, 0x0)
04:39:30 executing program 6:
openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0)
msgrcv(0x0, &(0x7f0000000040)={0x0, ""/27}, 0x23, 0x0, 0x0)
04:39:30 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)})
shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil)
ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}})
04:39:30 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]})
shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil)
add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0)
04:39:30 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6}]})
getsockname(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @dev}}}, &(0x7f0000000080)=0x80)
setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f00000000c0), 0x4)
04:39:30 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000200))
04:39:30 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5022b}]})
seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)})
ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000040))
04:39:30 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050253}]})
seccomp(0x0, 0x0, &(0x7f0000000040))
openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0)
04:39:30 executing program 3:
04:39:30 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)})
shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil)
ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}})
[ 516.685108] audit: type=1326 audit(1529728770.682:710): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=32540 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:39:30 executing program 3:
04:39:30 executing program 6:
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5021a}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0)
msgrcv(0x0, &(0x7f0000000040)={0x0, ""/27}, 0x23, 0x0, 0x0)
[ 516.793623] audit: type=1326 audit(1529728770.792:711): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=32552 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:39:30 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)})
shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil)
ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}})
04:39:30 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000200))
04:39:30 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050253}]})
openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0)
04:39:30 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5022b}]})
seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)})
ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000040))
04:39:30 executing program 3:
04:39:31 executing program 6:
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5021a}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0)
msgrcv(0x0, &(0x7f0000000040)={0x0, ""/27}, 0x23, 0x0, 0x0)
04:39:31 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501df}]})
shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil)
ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}})
04:39:31 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]})
shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil)
add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0)
[ 517.611897] audit: type=1326 audit(1529728771.610:712): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=32591 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:39:31 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050253}]})
openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0)
04:39:31 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6}]})
getsockname(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @dev}}}, &(0x7f0000000080)=0x80)
setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f00000000c0), 0x4)
04:39:31 executing program 3:
04:39:31 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6}]})
seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)})
ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000040))
04:39:31 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000200))
04:39:31 executing program 6:
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5021a}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0)
msgrcv(0x0, &(0x7f0000000040)={0x0, ""/27}, 0x23, 0x0, 0x0)
04:39:31 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501df}]})
shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil)
ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}})
[ 517.714846] audit: type=1326 audit(1529728771.713:713): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=32598 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:39:31 executing program 3:
04:39:31 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000200))
[ 517.788459] audit: type=1326 audit(1529728771.741:714): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=32603 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:39:31 executing program 6:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)})
openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0)
msgrcv(0x0, &(0x7f0000000040)={0x0, ""/27}, 0x23, 0x0, 0x0)
04:39:31 executing program 3:
04:39:31 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501df}]})
shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil)
ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}})
04:39:31 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050253}]})
openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0)
04:39:32 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000200))
04:39:32 executing program 3:
[ 518.107732] audit: type=1326 audit(1529728772.106:715): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=32627 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:39:32 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]})
shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil)
add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0)
04:39:32 executing program 6:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)})
openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0)
msgrcv(0x0, &(0x7f0000000040)={0x0, ""/27}, 0x23, 0x0, 0x0)
[ 518.552333] audit: type=1326 audit(1529728772.550:716): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=32638 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:39:32 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6}]})
seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)})
ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000040))
04:39:32 executing program 7:
seccomp(0x0, 0x0, &(0x7f0000000040))
openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0)
04:39:32 executing program 6:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)})
openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0)
msgrcv(0x0, &(0x7f0000000040)={0x0, ""/27}, 0x23, 0x0, 0x0)
04:39:32 executing program 3:
04:39:32 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]})
shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil)
ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}})
04:39:32 executing program 2:
04:39:32 executing program 3:
04:39:32 executing program 6:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5021a}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0)
msgrcv(0x0, &(0x7f0000000040)={0x0, ""/27}, 0x23, 0x0, 0x0)
04:39:32 executing program 7:
seccomp(0x0, 0x0, &(0x7f0000000040))
openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0)
04:39:32 executing program 2:
04:39:32 executing program 3:
04:39:32 executing program 6:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5021a}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0)
msgrcv(0x0, &(0x7f0000000040)={0x0, ""/27}, 0x23, 0x0, 0x0)
04:39:33 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000200))
04:39:33 executing program 7:
seccomp(0x0, 0x0, &(0x7f0000000040))
openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0)
04:39:33 executing program 7:
seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050253}]})
seccomp(0x0, 0x0, &(0x7f0000000040))
openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0)
04:39:33 executing program 3:
04:39:33 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6}]})
seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)})
ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000040))
04:39:33 executing program 2:
04:39:33 executing program 6:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5021a}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0)
msgrcv(0x0, &(0x7f0000000040)={0x0, ""/27}, 0x23, 0x0, 0x0)
04:39:33 executing program 0:
04:39:33 executing program 3:
04:39:33 executing program 7:
seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050253}]})
seccomp(0x0, 0x0, &(0x7f0000000040))
openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0)
04:39:33 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]})
shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil)
ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}})
04:39:33 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e2}]})
socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0))
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0)
04:39:33 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
ioprio_set$pid(0x0, 0x0, 0x0)
04:39:33 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
getgid()
04:39:33 executing program 7:
seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050253}]})
seccomp(0x0, 0x0, &(0x7f0000000040))
openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0)
04:39:33 executing program 6:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0)
msgrcv(0x0, &(0x7f0000000040)={0x0, ""/27}, 0x23, 0x0, 0x0)
[ 519.883679] kauditd_printk_skb: 5 callbacks suppressed
[ 519.883703] audit: type=1326 audit(1529728773.882:722): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=32714 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:39:34 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000200))
04:39:34 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e2}]})
socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0))
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0)
04:39:34 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)})
seccomp(0x0, 0x0, &(0x7f0000000040))
openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0)
04:39:34 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)={0x303, 0x33}, 0x4)
[ 520.090249] audit: type=1326 audit(1529728774.089:723): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=32731 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:39:34 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]})
shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil)
ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}})
04:39:34 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
ioprio_set$pid(0x0, 0x0, 0x0)
04:39:34 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)})
seccomp(0x0, 0x0, &(0x7f0000000040))
openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0)
04:39:34 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e2}]})
socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0))
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0)
04:39:34 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)={0x303, 0x33}, 0x4)
04:39:34 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
socket$inet_udp(0x2, 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20)
[ 520.630984] audit: type=1326 audit(1529728774.626:724): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=32740 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:39:34 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)})
seccomp(0x0, 0x0, &(0x7f0000000040))
openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0)
04:39:34 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)={0x303, 0x33}, 0x4)
04:39:34 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e2}]})
socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0))
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0)
04:39:34 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
ioprio_set$pid(0x0, 0x0, 0x0)
04:39:34 executing program 6:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0)
msgrcv(0x0, &(0x7f0000000040)={0x0, ""/27}, 0x23, 0x0, 0x0)
04:39:34 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
socket$inet_udp(0x2, 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20)
[ 520.958226] audit: type=1326 audit(1529728774.956:725): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=302 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:39:35 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)={0x303, 0x33}, 0x4)
04:39:35 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x40000000050253}]})
seccomp(0x0, 0x0, &(0x7f0000000040))
openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0)
04:39:35 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e2}]})
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0)
04:39:35 executing program 5:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0)
socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000040))
04:39:35 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x40000000050253}]})
seccomp(0x0, 0x0, &(0x7f0000000040))
openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0)
04:39:35 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
ioprio_set$pid(0x0, 0x0, 0x0)
04:39:35 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
socket$inet_udp(0x2, 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20)
04:39:35 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e2}]})
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0)
04:39:35 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)={0x303, 0x33}, 0x4)
04:39:35 executing program 5:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0)
socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000040))
04:39:35 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]})
seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000240)})
getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/50, &(0x7f00000000c0)=0x32)
04:39:35 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x40000000050253}]})
seccomp(0x0, 0x0, &(0x7f0000000040))
openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0)
04:39:35 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
ioprio_set$pid(0x0, 0x0, 0x0)
04:39:35 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e2}]})
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0)
04:39:35 executing program 6:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0)
msgrcv(0x0, &(0x7f0000000040)={0x0, ""/27}, 0x23, 0x0, 0x0)
04:39:35 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)={0x303, 0x33}, 0x4)
04:39:35 executing program 5:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0)
socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000040))
04:39:35 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
socket$inet_udp(0x2, 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20)
04:39:35 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]})
seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000240)})
getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/50, &(0x7f00000000c0)=0x32)
04:39:35 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]})
seccomp(0x0, 0x0, &(0x7f0000000040))
openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0)
04:39:35 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
ioprio_set$pid(0x0, 0x0, 0x0)
04:39:36 executing program 2:
socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0))
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0)
[ 521.979229] audit: type=1326 audit(1529728775.977:726): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=370 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:39:36 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]})
seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000240)})
getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/50, &(0x7f00000000c0)=0x32)
04:39:36 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)={0x303, 0x33}, 0x4)
[ 522.053812] audit: type=1326 audit(1529728776.009:727): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=369 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:39:36 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20)
04:39:36 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
ioprio_set$pid(0x0, 0x0, 0x0)
04:39:36 executing program 5:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0)
socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000040))
04:39:36 executing program 2:
socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0))
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0)
04:39:36 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]})
seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000240)})
getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/50, &(0x7f00000000c0)=0x32)
04:39:36 executing program 0:
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)={0x303, 0x33}, 0x4)
04:39:36 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]})
getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/50, &(0x7f00000000c0)=0x32)
04:39:36 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20)
04:39:36 executing program 3:
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
ioprio_set$pid(0x0, 0x0, 0x0)
04:39:36 executing program 2:
socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0))
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0)
04:39:36 executing program 5:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000040))
04:39:36 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]})
seccomp(0x0, 0x0, &(0x7f0000000040))
openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0)
04:39:36 executing program 0:
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)={0x303, 0x33}, 0x4)
04:39:36 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]})
openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0)
ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01)
[ 522.977971] audit: type=1326 audit(1529728776.976:728): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=421 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:39:37 executing program 3:
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
ioprio_set$pid(0x0, 0x0, 0x0)
04:39:37 executing program 2:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e2}]})
socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0))
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0)
04:39:37 executing program 0:
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)={0x303, 0x33}, 0x4)
04:39:37 executing program 5:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000040))
04:39:37 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]})
getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/50, &(0x7f00000000c0)=0x32)
04:39:37 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20)
04:39:37 executing program 3:
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
ioprio_set$pid(0x0, 0x0, 0x0)
04:39:37 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]})
open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
symlinkat(&(0x7f0000000580)='./file0\x00', 0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00')
04:39:37 executing program 2:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e2}]})
socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0))
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0)
04:39:37 executing program 0:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)={0x303, 0x33}, 0x4)
04:39:37 executing program 5:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000040))
04:39:37 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]})
getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/50, &(0x7f00000000c0)=0x32)
04:39:37 executing program 1:
socket$inet_udp(0x2, 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20)
04:39:37 executing program 2:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e2}]})
socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0))
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0)
04:39:37 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]})
seccomp(0x0, 0x0, &(0x7f0000000040))
openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0)
04:39:37 executing program 3:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
ioprio_set$pid(0x0, 0x0, 0x0)
04:39:37 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]})
open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
symlinkat(&(0x7f0000000580)='./file0\x00', 0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00')
04:39:37 executing program 0:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)={0x303, 0x33}, 0x4)
04:39:37 executing program 1:
socket$inet_udp(0x2, 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20)
04:39:37 executing program 5:
openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0)
socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000040))
04:39:37 executing program 4:
seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000240)})
getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/50, &(0x7f00000000c0)=0x32)
[ 523.953752] audit: type=1326 audit(1529728777.952:729): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=494 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:39:38 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)})
socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0))
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0)
04:39:38 executing program 3:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
ioprio_set$pid(0x0, 0x0, 0x0)
04:39:38 executing program 0:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)={0x303, 0x33}, 0x4)
04:39:38 executing program 4:
seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000240)})
getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/50, &(0x7f00000000c0)=0x32)
04:39:38 executing program 1:
socket$inet_udp(0x2, 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20)
04:39:38 executing program 5:
openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0)
socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000040))
04:39:38 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]})
open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
symlinkat(&(0x7f0000000580)='./file0\x00', 0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00')
04:39:38 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)})
socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0))
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0)
04:39:38 executing program 4:
seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000240)})
getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/50, &(0x7f00000000c0)=0x32)
04:39:38 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)={0x303, 0x33}, 0x4)
04:39:38 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]})
open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
symlinkat(&(0x7f0000000580)='./file0\x00', 0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00')
04:39:38 executing program 3:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
ioprio_set$pid(0x0, 0x0, 0x0)
04:39:38 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
socket$inet_udp(0x2, 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20)
04:39:38 executing program 5:
openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0)
socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000040))
04:39:38 executing program 4:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]})
seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000240)})
getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/50, &(0x7f00000000c0)=0x32)
04:39:38 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)})
socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0))
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0)
04:39:38 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0)
ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0)
04:39:39 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
socket$inet_udp(0x2, 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20)
04:39:39 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)={0x303, 0x33}, 0x4)
04:39:39 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
ioprio_set$pid(0x0, 0x0, 0x0)
04:39:39 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e2}]})
socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0))
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0)
04:39:39 executing program 4:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]})
seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000240)})
getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/50, &(0x7f00000000c0)=0x32)
04:39:39 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]})
symlinkat(&(0x7f0000000580)='./file0\x00', 0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00')
04:39:39 executing program 5:
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0)
socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000040))
04:39:39 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0)
ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0)
04:39:39 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e2}]})
socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0))
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0)
04:39:39 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)={0x303, 0x33}, 0x4)
04:39:39 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
socket$inet_udp(0x2, 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20)
04:39:39 executing program 4:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]})
seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000240)})
getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/50, &(0x7f00000000c0)=0x32)
04:39:39 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
ioprio_set$pid(0x0, 0x0, 0x0)
04:39:39 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]})
symlinkat(&(0x7f0000000580)='./file0\x00', 0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00')
04:39:39 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e2}]})
socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0))
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0)
04:39:39 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0)
ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0)
04:39:39 executing program 5:
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0)
socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000040))
04:39:39 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000040))
seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000240)})
getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/50, &(0x7f00000000c0)=0x32)
04:39:39 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)={0x303, 0x33}, 0x4)
04:39:39 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
ioprio_set$pid(0x0, 0x0, 0x0)
04:39:39 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
socket$inet_udp(0x2, 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20)
04:39:39 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]})
symlinkat(&(0x7f0000000580)='./file0\x00', 0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00')
04:39:39 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000040))
seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000240)})
getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/50, &(0x7f00000000c0)=0x32)
04:39:39 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]})
socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0))
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0)
04:39:39 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0)
ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0)
04:39:39 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)={0x303, 0x33}, 0x4)
04:39:39 executing program 5:
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0)
socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000040))
04:39:39 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
ioprio_set$pid(0x0, 0x0, 0x0)
04:39:39 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
socket$inet_udp(0x2, 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20)
[ 525.865853] audit: type=1326 audit(1529728779.864:730): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=629 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:39:39 executing program 6:
open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
symlinkat(&(0x7f0000000580)='./file0\x00', 0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00')
04:39:39 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000040))
seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000240)})
getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/50, &(0x7f00000000c0)=0x32)
04:39:40 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0)
04:39:40 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
ioprio_set$pid(0x0, 0x0, 0x0)
04:39:40 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)={0x303, 0x33}, 0x4)
04:39:40 executing program 5:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)})
openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0)
socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000040))
04:39:40 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
socket$inet_udp(0x2, 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20)
04:39:40 executing program 6:
open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
symlinkat(&(0x7f0000000580)='./file0\x00', 0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00')
04:39:40 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50358}]})
seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000240)})
getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/50, &(0x7f00000000c0)=0x32)
04:39:40 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)={0x303, 0x33}, 0x4)
[ 526.440499] audit: type=1326 audit(1529728780.439:731): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=677 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:39:40 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]})
socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0))
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0)
04:39:40 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
ioprio_set$pid(0x0, 0x0, 0x0)
04:39:40 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0)
04:39:40 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
socket$inet_udp(0x2, 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20)
04:39:40 executing program 5:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)})
openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0)
socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000040))
04:39:40 executing program 6:
open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
symlinkat(&(0x7f0000000580)='./file0\x00', 0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00')
04:39:40 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50358}]})
seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000240)})
getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/50, &(0x7f00000000c0)=0x32)
[ 526.826762] audit: type=1326 audit(1529728780.824:732): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=696 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:39:40 executing program 6:
seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]})
open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
symlinkat(&(0x7f0000000580)='./file0\x00', 0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00')
04:39:40 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
socket$inet_udp(0x2, 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20)
04:39:40 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50358}]})
seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000240)})
getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/50, &(0x7f00000000c0)=0x32)
04:39:40 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
ioprio_set$pid(0x0, 0x0, 0x0)
04:39:40 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0)
04:39:40 executing program 5:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)})
openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0)
socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000040))
[ 527.025232] audit: type=1326 audit(1529728781.023:733): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=711 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:39:41 executing program 6:
seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]})
open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
symlinkat(&(0x7f0000000580)='./file0\x00', 0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00')
04:39:41 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
socket$inet_udp(0x2, 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20)
04:39:41 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)={0x303, 0x33}, 0x4)
[ 527.348851] audit: type=1326 audit(1529728781.347:734): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=734 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:39:41 executing program 7:
openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0)
ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0)
04:39:41 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]})
socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0))
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0)
04:39:41 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]})
seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000240)})
getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/50, &(0x7f00000000c0)=0x32)
04:39:41 executing program 5:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0)
socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000040))
04:39:41 executing program 6:
seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]})
open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
symlinkat(&(0x7f0000000580)='./file0\x00', 0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00')
04:39:41 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
socket$inet_udp(0x2, 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20)
[ 527.762489] audit: type=1326 audit(1529728781.761:735): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=741 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
[ 527.807025] audit: type=1326 audit(1529728781.787:736): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=739 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:39:41 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)})
open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
symlinkat(&(0x7f0000000580)='./file0\x00', 0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00')
04:39:41 executing program 7:
openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0)
ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0)
04:39:41 executing program 5:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0)
socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000040))
[ 527.842425] audit: type=1326 audit(1529728781.826:737): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=751 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:39:41 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
ioprio_set$pid(0x0, 0x0, 0x0)
04:39:41 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)})
open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
symlinkat(&(0x7f0000000580)='./file0\x00', 0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00')
04:39:42 executing program 7:
openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0)
ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0)
04:39:42 executing program 7:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0)
ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0)
[ 528.065568] audit: type=1326 audit(1529728782.063:738): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=768 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:39:42 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)})
open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
symlinkat(&(0x7f0000000580)='./file0\x00', 0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00')
04:39:42 executing program 5:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0)
socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000040))
04:39:42 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)={0x303, 0x33}, 0x4)
04:39:42 executing program 7:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0)
ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0)
[ 528.360953] audit: type=1326 audit(1529728782.359:739): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=792 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:39:42 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]})
seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000240)})
getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/50, &(0x7f00000000c0)=0x32)
04:39:42 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x5000c}]})
open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
symlinkat(&(0x7f0000000580)='./file0\x00', 0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00')
04:39:42 executing program 5:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0)
socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000040))
04:39:42 executing program 7:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0)
ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0)
04:39:42 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4080000000000006, 0x0, 0x0, 0x800050209}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0)
shmctl$IPC_RMID(0x0, 0x0)
04:39:42 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
socket$inet_udp(0x2, 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20)
04:39:42 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0)
ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0)
04:39:42 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x5000c}]})
open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
symlinkat(&(0x7f0000000580)='./file0\x00', 0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00')
04:39:42 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
ioprio_set$pid(0x0, 0x0, 0x0)
04:39:42 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0)
ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0)
04:39:42 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x5000c}]})
open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
symlinkat(&(0x7f0000000580)='./file0\x00', 0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00')
04:39:42 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4080000000000006, 0x0, 0x0, 0x800050209}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0)
shmctl$IPC_RMID(0x0, 0x0)
04:39:43 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]})
open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
symlinkat(&(0x7f0000000580)='./file0\x00', 0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00')
04:39:43 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0)
ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0)
04:39:43 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0)
ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0)
04:39:43 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4080000000000006, 0x0, 0x0, 0x800050209}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0)
shmctl$IPC_RMID(0x0, 0x0)
04:39:43 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]})
seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000240)})
getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/50, &(0x7f00000000c0)=0x32)
04:39:43 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0)
renameat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00')
04:39:43 executing program 5:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0)
socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000040))
04:39:43 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0)
ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0)
04:39:43 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4080000000000006, 0x0, 0x0, 0x800050209}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0)
shmctl$IPC_RMID(0x0, 0x0)
04:39:43 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
socket$inet_udp(0x2, 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20)
04:39:43 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0)
renameat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00')
04:39:43 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0)
ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0)
04:39:43 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0)
ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0)
04:39:43 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4080000000000006, 0x0, 0x0, 0x800050209}]})
shmctl$IPC_RMID(0x0, 0x0)
04:39:43 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0)
renameat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00')
04:39:43 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]})
syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00')
accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0)
04:39:44 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]})
open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
symlinkat(&(0x7f0000000580)='./file0\x00', 0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00')
04:39:44 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4080000000000006, 0x0, 0x0, 0x800050209}]})
shmctl$IPC_RMID(0x0, 0x0)
04:39:44 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0)
renameat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00')
04:39:44 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]})
syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00')
accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0)
04:39:44 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]})
syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00')
accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0)
04:39:44 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4080000000000006, 0x0, 0x0, 0x800050209}]})
shmctl$IPC_RMID(0x0, 0x0)
04:39:44 executing program 5:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0)
socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000040))
04:39:44 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
renameat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00')
04:39:44 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0)
socket$inet_icmp_raw(0x2, 0x3, 0x1)
04:39:44 executing program 2:
openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0)
shmctl$IPC_RMID(0x0, 0x0)
04:39:44 executing program 1:
seccomp(0x10000000001, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]})
bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c)
remap_file_pages(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0)
04:39:44 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]})
syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00')
accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0)
04:39:44 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0)
ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0)
04:39:44 executing program 2:
openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0)
shmctl$IPC_RMID(0x0, 0x0)
04:39:44 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
renameat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00')
04:39:44 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140))
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x0)
[ 531.029599] kauditd_printk_skb: 11 callbacks suppressed
[ 531.029622] audit: type=1326 audit(1529728785.028:751): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=950 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:39:45 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]})
open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
symlinkat(&(0x7f0000000580)='./file0\x00', 0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00')
04:39:45 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0)
socket$inet_icmp_raw(0x2, 0x3, 0x1)
04:39:45 executing program 2:
openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0)
shmctl$IPC_RMID(0x0, 0x0)
04:39:45 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]})
accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0)
04:39:45 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
renameat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00')
[ 531.189571] audit: type=1326 audit(1529728785.187:752): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=962 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:39:45 executing program 2:
seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4080000000000006, 0x0, 0x0, 0x800050209}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0)
shmctl$IPC_RMID(0x0, 0x0)
04:39:45 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140))
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x0)
04:39:45 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0)
socket$inet_icmp_raw(0x2, 0x3, 0x1)
04:39:45 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]})
accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0)
04:39:45 executing program 0:
openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0)
renameat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00')
04:39:45 executing program 2:
seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4080000000000006, 0x0, 0x0, 0x800050209}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0)
shmctl$IPC_RMID(0x0, 0x0)
04:39:45 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x8000502ae}]})
openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0)
ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100))
04:39:45 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0)
ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0)
04:39:45 executing program 2:
seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4080000000000006, 0x0, 0x0, 0x800050209}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0)
shmctl$IPC_RMID(0x0, 0x0)
04:39:45 executing program 0:
openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0)
renameat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00')
04:39:45 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]})
accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0)
[ 532.026022] audit: type=1326 audit(1529728786.024:753): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=1009 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:39:46 executing program 3:
syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00')
accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0)
04:39:46 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x8000502ae}]})
openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0)
ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100))
04:39:46 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140))
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x0)
04:39:46 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
sched_getaffinity(0x0, 0x8, &(0x7f00000000c0))
04:39:46 executing program 0:
openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0)
renameat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00')
04:39:46 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0)
socket$inet_icmp_raw(0x2, 0x3, 0x1)
04:39:46 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)})
openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0)
shmctl$IPC_RMID(0x0, 0x0)
04:39:46 executing program 0:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0)
renameat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00')
04:39:46 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)})
openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0)
shmctl$IPC_RMID(0x0, 0x0)
04:39:46 executing program 3:
syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00')
accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0)
04:39:46 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140))
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x0)
04:39:46 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x8000502ae}]})
openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0)
ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100))
04:39:46 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x8000502ae}]})
openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0)
ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100))
04:39:46 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
socket$inet_icmp_raw(0x2, 0x3, 0x1)
04:39:46 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
sched_getaffinity(0x0, 0x8, &(0x7f00000000c0))
04:39:46 executing program 0:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0)
renameat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00')
04:39:46 executing program 3:
syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00')
accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0)
04:39:46 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)})
openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0)
shmctl$IPC_RMID(0x0, 0x0)
04:39:46 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0)
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280), 0x4)
04:39:46 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x0)
04:39:47 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0)
shmctl$IPC_RMID(0x0, 0x0)
04:39:47 executing program 3:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]})
syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00')
accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0)
04:39:47 executing program 0:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0)
renameat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00')
04:39:47 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x8000502ae}]})
ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100))
04:39:47 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
socket$inet_icmp_raw(0x2, 0x3, 0x1)
04:39:47 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
sched_getaffinity(0x0, 0x8, &(0x7f00000000c0))
04:39:47 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x0)
04:39:47 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0)
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280), 0x4)
04:39:47 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0)
shmctl$IPC_RMID(0x0, 0x0)
04:39:47 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0)
renameat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00')
04:39:47 executing program 3:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]})
syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00')
accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0)
04:39:47 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x8000502ae}]})
ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100))
04:39:47 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
sched_getaffinity(0x0, 0x8, &(0x7f00000000c0))
04:39:47 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
socket$inet_icmp_raw(0x2, 0x3, 0x1)
04:39:47 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x0)
04:39:47 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0)
renameat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00')
04:39:47 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0)
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280), 0x4)
04:39:47 executing program 3:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]})
syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00')
accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0)
04:39:47 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0)
shmctl$IPC_RMID(0x0, 0x0)
04:39:47 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x8000502ae}]})
ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100))
04:39:47 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
sched_getaffinity(0x0, 0x8, &(0x7f00000000c0))
04:39:47 executing program 4:
openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0)
socket$inet_icmp_raw(0x2, 0x3, 0x1)
04:39:47 executing program 1:
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140))
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x0)
04:39:47 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0)
renameat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00')
04:39:47 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4080000000000006}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0)
shmctl$IPC_RMID(0x0, 0x0)
04:39:47 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)})
syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00')
accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0)
04:39:47 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0)
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280), 0x4)
04:39:47 executing program 5:
openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0)
ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100))
04:39:48 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
sched_getaffinity(0x0, 0x8, &(0x7f00000000c0))
[ 533.954309] audit: type=1326 audit(1529728787.953:754): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=1148 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:39:48 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0)
renameat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00')
04:39:48 executing program 4:
openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0)
socket$inet_icmp_raw(0x2, 0x3, 0x1)
04:39:48 executing program 1:
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140))
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x0)
04:39:48 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)})
syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00')
accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0)
04:39:48 executing program 5:
openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0)
ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100))
04:39:48 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0)
renameat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00')
04:39:48 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
sched_getaffinity(0x0, 0x8, &(0x7f00000000c0))
04:39:48 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280), 0x4)
04:39:48 executing program 4:
openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0)
socket$inet_icmp_raw(0x2, 0x3, 0x1)
04:39:48 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)})
syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00')
accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0)
04:39:48 executing program 1:
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140))
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x0)
04:39:48 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4080000000000006}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0)
shmctl$IPC_RMID(0x0, 0x0)
04:39:48 executing program 5:
openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0)
ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100))
04:39:48 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280), 0x4)
04:39:48 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0)
renameat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00')
04:39:48 executing program 6:
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
sched_getaffinity(0x0, 0x8, &(0x7f00000000c0))
04:39:48 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]})
syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00')
accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0)
04:39:48 executing program 4:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0)
socket$inet_icmp_raw(0x2, 0x3, 0x1)
04:39:48 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140))
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x0)
[ 534.882841] audit: type=1326 audit(1529728788.881:755): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=1207 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:39:48 executing program 5:
seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x8000502ae}]})
openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0)
ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100))
04:39:49 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0)
renameat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00')
04:39:49 executing program 4:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0)
socket$inet_icmp_raw(0x2, 0x3, 0x1)
04:39:49 executing program 6:
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
sched_getaffinity(0x0, 0x8, &(0x7f00000000c0))
04:39:49 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280), 0x4)
04:39:49 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140))
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x0)
04:39:49 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]})
syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00')
accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0)
04:39:49 executing program 5:
seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x8000502ae}]})
openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0)
ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100))
[ 535.099380] audit: type=1326 audit(1529728789.097:756): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=1227 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:39:49 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4080000000000006}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0)
shmctl$IPC_RMID(0x0, 0x0)
04:39:49 executing program 6:
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
sched_getaffinity(0x0, 0x8, &(0x7f00000000c0))
04:39:49 executing program 4:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0)
socket$inet_icmp_raw(0x2, 0x3, 0x1)
04:39:49 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140))
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x0)
04:39:49 executing program 7:
dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0)
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280), 0x4)
04:39:49 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]})
syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00')
accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0)
04:39:49 executing program 5:
seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x8000502ae}]})
openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0)
ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100))
04:39:49 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140))
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x0)
04:39:49 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]})
syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00')
accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0)
[ 535.853387] audit: type=1326 audit(1529728789.851:757): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=1262 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:39:50 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0)
renameat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00')
04:39:50 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0)
socket$inet_icmp_raw(0x2, 0x3, 0x1)
04:39:50 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000040)})
openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0)
ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100))
04:39:50 executing program 6:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
sched_getaffinity(0x0, 0x8, &(0x7f00000000c0))
04:39:50 executing program 7:
dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0)
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280), 0x4)
[ 536.014490] audit: type=1326 audit(1529728790.013:758): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=1272 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:39:50 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140))
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x0)
04:39:50 executing program 6:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
sched_getaffinity(0x0, 0x8, &(0x7f00000000c0))
[ 536.165342] audit: type=1326 audit(1529728790.163:759): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=1293 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:39:50 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000040)})
openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0)
ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100))
04:39:50 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0)
socket$inet_icmp_raw(0x2, 0x3, 0x1)
04:39:50 executing program 7:
dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0)
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280), 0x4)
04:39:50 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140))
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x0)
04:39:50 executing program 6:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
sched_getaffinity(0x0, 0x8, &(0x7f00000000c0))
04:39:50 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]})
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x7530}, 0x10)
04:39:50 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000040)})
openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0)
ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100))
04:39:50 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022d}]})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140))
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x0)
04:39:50 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]})
syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00')
accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0)
04:39:51 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0)
renameat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00')
04:39:51 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0)
socket$inet_icmp_raw(0x2, 0x3, 0x1)
04:39:51 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
sched_getaffinity(0x0, 0x8, &(0x7f00000000c0))
04:39:51 executing program 7:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0)
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280), 0x4)
04:39:51 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]})
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x7530}, 0x10)
04:39:51 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x8000502ae}]})
openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0)
ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100))
04:39:51 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022d}]})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140))
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x0)
[ 537.061810] audit: type=1326 audit(1529728791.060:760): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=1335 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:39:51 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022d}]})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140))
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x0)
[ 537.187245] audit: type=1326 audit(1529728791.185:761): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=1350 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:39:51 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0)
socket$inet_icmp_raw(0x2, 0x3, 0x1)
04:39:51 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
sched_getaffinity(0x0, 0x8, &(0x7f00000000c0))
04:39:51 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x8000502ae}]})
openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0)
ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100))
04:39:51 executing program 7:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0)
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280), 0x4)
04:39:51 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]})
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x7530}, 0x10)
04:39:51 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0)
socket$inet_icmp_raw(0x2, 0x3, 0x1)
04:39:51 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140))
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x0)
[ 537.537837] audit: type=1326 audit(1529728791.536:762): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=1378 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:39:51 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]})
syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00')
accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0)
[ 537.959302] audit: type=1326 audit(1529728791.958:763): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=1384 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:39:52 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]})
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x7530}, 0x10)
04:39:52 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
sched_getaffinity(0x0, 0x8, &(0x7f00000000c0))
04:39:52 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x8000502ae}]})
openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0)
ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100))
04:39:52 executing program 7:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0)
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280), 0x4)
04:39:52 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
pipe(&(0x7f0000000400))
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'team_slave_0\x00'})
04:39:52 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0)
socket$inet_icmp_raw(0x2, 0x3, 0x1)
04:39:52 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)})
dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0)
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280), 0x4)
04:39:52 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0)
socket$inet_icmp_raw(0x2, 0x3, 0x1)
04:39:52 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
sched_getaffinity(0x0, 0x8, &(0x7f00000000c0))
04:39:52 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]})
openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0)
ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100))
04:39:52 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]})
setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x7530}, 0x10)
[ 538.251981] audit: type=1326 audit(1529728792.250:764): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=1403 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:39:52 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
pipe(&(0x7f0000000400))
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'team_slave_0\x00'})
04:39:52 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
sched_getaffinity(0x0, 0x8, &(0x7f00000000c0))
[ 538.338650] audit: type=1326 audit(1529728792.299:765): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=1408 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:39:52 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)})
dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0)
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280), 0x4)
04:39:52 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140))
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x0)
[ 538.573631] audit: type=1326 audit(1529728792.572:766): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=1429 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:39:52 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
pipe(&(0x7f0000000400))
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'team_slave_0\x00'})
04:39:52 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]})
setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x7530}, 0x10)
04:39:52 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
sched_getaffinity(0x0, 0x8, &(0x7f00000000c0))
04:39:52 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)})
dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0)
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280), 0x4)
04:39:52 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000100)="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")
04:39:52 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
sched_getaffinity(0x0, 0x8, &(0x7f00000000c0))
04:39:53 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]})
dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0)
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280), 0x4)
04:39:53 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]})
setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x7530}, 0x10)
[ 539.047211] audit: type=1326 audit(1529728793.040:767): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=1448 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:39:53 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0)
socket$inet_icmp_raw(0x2, 0x3, 0x1)
04:39:53 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000100)="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")
04:39:53 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]})
openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0)
ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100))
04:39:53 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
pipe(&(0x7f0000000400))
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'team_slave_0\x00'})
04:39:53 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]})
dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0)
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280), 0x4)
04:39:53 executing program 2:
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x7530}, 0x10)
[ 539.255799] audit: type=1326 audit(1529728793.253:768): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=1472 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:39:53 executing program 2:
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x7530}, 0x10)
04:39:53 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140))
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x0)
04:39:53 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000100)="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")
04:39:53 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'team_slave_0\x00'})
04:39:53 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]})
dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0)
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280), 0x4)
04:39:53 executing program 2:
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x7530}, 0x10)
04:39:53 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]})
dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0)
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280), 0x4)
04:39:53 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000100)="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")
04:39:53 executing program 2:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]})
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x7530}, 0x10)
04:39:53 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
sched_getaffinity(0x0, 0x8, &(0x7f00000000c0))
04:39:54 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0)
socket$inet_icmp_raw(0x2, 0x3, 0x1)
04:39:54 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'team_slave_0\x00'})
04:39:54 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]})
openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0)
ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100))
04:39:54 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'team_slave_0\x00'})
04:39:54 executing program 2:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]})
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x7530}, 0x10)
04:39:54 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000100)="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")
04:39:54 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000100)="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")
04:39:54 executing program 0:
pipe(&(0x7f0000000400))
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'team_slave_0\x00'})
04:39:54 executing program 2:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]})
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x7530}, 0x10)
04:39:54 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]})
pipe(&(0x7f0000000080))
ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000000c0)=""/231)
04:39:54 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000100)="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")
04:39:54 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)})
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x7530}, 0x10)
04:39:54 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]})
dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0)
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280), 0x4)
04:39:54 executing program 0:
pipe(&(0x7f0000000400))
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'team_slave_0\x00'})
04:39:54 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
sched_getaffinity(0x0, 0x8, &(0x7f00000000c0))
04:39:54 executing program 3:
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000100)="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")
04:39:55 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]})
pipe(&(0x7f0000000080))
ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000000c0)=""/231)
04:39:55 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)})
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x7530}, 0x10)
04:39:55 executing program 0:
pipe(&(0x7f0000000400))
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'team_slave_0\x00'})
04:39:55 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]})
pipe(&(0x7f0000000080))
ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000000c0)=""/231)
04:39:55 executing program 3:
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000100)="b3b080dc9ae1507bb0b1fdf2e529ef33a17c401083a7ce1e4818844cfc3ac27c77d91a6868b1b9a29669607b7b1e19d464fd7c6b7663a24b3f7eabde2089a6a61d09aacdfc5a5c60df55a597476e7be192a04dce07c9c01d37af8c906611b6976d432517d5e7f3022ddb1c70661c9064cbbd468b8f3037ef32158756471b1d8138aaf58ee554a72d0004ff75c8047b1885c5ba64efa879f3c57543f0418debfcf4723f7fbf998f0ac42bfb6a73f99d511137fde19c205c8ad66195aa7ecacf1f68164542bea3bf5534ef914b0243ce509620c41759a074fe8e49a309bc0d38fc337516e1a925b2cf4b6f40554c56eda8847f954c9353f57da6c040668d0b321c")
04:39:55 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)})
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x7530}, 0x10)
04:39:55 executing program 0:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
pipe(&(0x7f0000000400))
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'team_slave_0\x00'})
04:39:55 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000100))
04:39:55 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0)
fcntl$notify(0xffffffffffffffff, 0x402, 0x0)
04:39:55 executing program 0:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
pipe(&(0x7f0000000400))
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'team_slave_0\x00'})
04:39:55 executing program 3:
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000100)="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")
04:39:55 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]})
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x7530}, 0x10)
04:39:55 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]})
dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0)
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280), 0x4)
04:39:55 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]})
pipe(&(0x7f0000000080))
ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000000c0)=""/231)
[ 541.641832] kauditd_printk_skb: 8 callbacks suppressed
[ 541.641855] audit: type=1326 audit(1529728795.640:777): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=1623 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:39:55 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]})
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x7530}, 0x10)
04:39:55 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000100))
04:39:55 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0)
fcntl$notify(0xffffffffffffffff, 0x402, 0x0)
04:39:55 executing program 0:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
pipe(&(0x7f0000000400))
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'team_slave_0\x00'})
04:39:55 executing program 3:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000100)="b3b080dc9ae1507bb0b1fdf2e529ef33a17c401083a7ce1e4818844cfc3ac27c77d91a6868b1b9a29669607b7b1e19d464fd7c6b7663a24b3f7eabde2089a6a61d09aacdfc5a5c60df55a597476e7be192a04dce07c9c01d37af8c906611b6976d432517d5e7f3022ddb1c70661c9064cbbd468b8f3037ef32158756471b1d8138aaf58ee554a72d0004ff75c8047b1885c5ba64efa879f3c57543f0418debfcf4723f7fbf998f0ac42bfb6a73f99d511137fde19c205c8ad66195aa7ecacf1f68164542bea3bf5534ef914b0243ce509620c41759a074fe8e49a309bc0d38fc337516e1a925b2cf4b6f40554c56eda8847f954c9353f57da6c040668d0b321c")
04:39:55 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0)
ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100))
04:39:55 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]})
ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000000c0)=""/231)
04:39:55 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]})
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x7530}, 0x10)
04:39:55 executing program 3:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000100)="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")
04:39:55 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
pipe(&(0x7f0000000400))
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'team_slave_0\x00'})
04:39:56 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]})
ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000000c0)=""/231)
04:39:56 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0)
fcntl$notify(0xffffffffffffffff, 0x402, 0x0)
04:39:56 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000100))
04:39:56 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0)
ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100))
04:39:56 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]})
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x7530}, 0x10)
04:39:56 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]})
ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000000c0)=""/231)
04:39:56 executing program 3:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000100)="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")
04:39:56 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
pipe(&(0x7f0000000400))
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'team_slave_0\x00'})
04:39:56 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0)
ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100))
04:39:56 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000100))
04:39:56 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0)
fcntl$notify(0xffffffffffffffff, 0x402, 0x0)
04:39:56 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]})
ustat(0x0, &(0x7f00000000c0))
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000140))
[ 542.601879] audit: type=1326 audit(1529728796.600:778): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=1676 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:39:56 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000100)="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")
04:39:56 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
pipe(&(0x7f0000000400))
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'team_slave_0\x00'})
04:39:56 executing program 1:
pipe(&(0x7f0000000080))
ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000000c0)=""/231)
04:39:56 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0)
ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100))
04:39:56 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
fcntl$notify(0xffffffffffffffff, 0x402, 0x0)
04:39:56 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000100))
04:39:56 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]})
ustat(0x0, &(0x7f00000000c0))
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000140))
04:39:56 executing program 1:
pipe(&(0x7f0000000080))
ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000000c0)=""/231)
04:39:57 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]})
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x7530}, 0x10)
04:39:57 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000100)="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")
04:39:57 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
pipe(&(0x7f0000000400))
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'team_slave_0\x00'})
04:39:57 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100))
04:39:57 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000100))
04:39:57 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
fcntl$notify(0xffffffffffffffff, 0x402, 0x0)
04:39:57 executing program 1:
pipe(&(0x7f0000000080))
ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000000c0)=""/231)
04:39:57 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]})
ustat(0x0, &(0x7f00000000c0))
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000140))
04:39:57 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]})
pipe(&(0x7f0000000080))
ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000000c0)=""/231)
[ 543.578845] audit: type=1326 audit(1529728797.577:779): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=1740 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:39:57 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
pipe(&(0x7f0000000400))
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'team_slave_0\x00'})
04:39:57 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100))
04:39:57 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000100)="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")
04:39:57 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
fcntl$notify(0xffffffffffffffff, 0x402, 0x0)
04:39:57 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]})
ustat(0x0, &(0x7f00000000c0))
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000140))
04:39:57 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000100))
04:39:57 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]})
pipe(&(0x7f0000000080))
ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000000c0)=""/231)
04:39:58 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]})
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x7530}, 0x10)
04:39:58 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100))
04:39:58 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
pipe(&(0x7f0000000400))
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'team_slave_0\x00'})
04:39:58 executing program 5:
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0)
fcntl$notify(0xffffffffffffffff, 0x402, 0x0)
04:39:58 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000100)="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")
04:39:58 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]})
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000140))
04:39:58 executing program 4:
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000100))
04:39:58 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]})
pipe(&(0x7f0000000080))
ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000000c0)=""/231)
[ 544.554562] audit: type=1326 audit(1529728798.553:780): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=1793 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:39:58 executing program 4:
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000100))
04:39:58 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
pipe(&(0x7f0000000400))
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'team_slave_0\x00'})
04:39:58 executing program 5:
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0)
fcntl$notify(0xffffffffffffffff, 0x402, 0x0)
04:39:58 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000100)="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")
04:39:58 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)})
pipe(&(0x7f0000000080))
ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000000c0)=""/231)
04:39:58 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]})
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000140))
04:39:58 executing program 6:
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0)
ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100))
[ 544.740563] audit: type=1326 audit(1529728798.739:781): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=1799 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:39:58 executing program 4:
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000100))
04:39:59 executing program 4:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000100))
04:39:59 executing program 5:
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0)
fcntl$notify(0xffffffffffffffff, 0x402, 0x0)
04:39:59 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000100)="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")
04:39:59 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)})
pipe(&(0x7f0000000080))
ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000000c0)=""/231)
04:39:59 executing program 6:
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0)
ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100))
04:39:59 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]})
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000140))
04:39:59 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
signalfd(0xffffffffffffff9c, &(0x7f0000000080), 0x8)
finit_module(0xffffffffffffffff, &(0x7f0000000140)="2f6465762f75696e70757400b442b1b7b930bdd7bcc25258a2a3ffb1ca57f90b0e6a03021c2489e08c8a951b2af3203e7d30241a389be58ce9f643c35f39505d53aad1b6a12128de4095e121fbfee734ceeb2501ba6cd697727da67dbbc9a9cd877ae7e05736a97f0275d42ddce2437061c6c08ac5ad634c9349c2339e98b03abb82e928000000", 0x0)
04:39:59 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)})
pipe(&(0x7f0000000080))
ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000000c0)=""/231)
04:39:59 executing program 5:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0)
fcntl$notify(0xffffffffffffffff, 0x402, 0x0)
04:39:59 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
pipe(&(0x7f0000000400))
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'team_slave_0\x00'})
04:39:59 executing program 6:
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0)
ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100))
04:39:59 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000100)="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")
04:39:59 executing program 4:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000100))
04:39:59 executing program 7:
ustat(0x0, &(0x7f00000000c0))
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000140))
04:39:59 executing program 5:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0)
fcntl$notify(0xffffffffffffffff, 0x402, 0x0)
[ 545.771178] audit: type=1326 audit(1529728799.769:782): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=1859 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:39:59 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
signalfd(0xffffffffffffff9c, &(0x7f0000000080), 0x8)
finit_module(0xffffffffffffffff, &(0x7f0000000140)="2f6465762f75696e70757400b442b1b7b930bdd7bcc25258a2a3ffb1ca57f90b0e6a03021c2489e08c8a951b2af3203e7d30241a389be58ce9f643c35f39505d53aad1b6a12128de4095e121fbfee734ceeb2501ba6cd697727da67dbbc9a9cd877ae7e05736a97f0275d42ddce2437061c6c08ac5ad634c9349c2339e98b03abb82e928000000", 0x0)
04:39:59 executing program 4:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000100))
04:39:59 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x5000c}]})
pipe(&(0x7f0000000080))
ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000000c0)=""/231)
[ 545.848162] audit: type=1326 audit(1529728799.807:783): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=1862 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:39:59 executing program 6:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0)
ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100))
04:39:59 executing program 7:
ustat(0x0, &(0x7f00000000c0))
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000140))
04:39:59 executing program 5:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0)
fcntl$notify(0xffffffffffffffff, 0x402, 0x0)
04:40:00 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)})
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000100))
04:40:00 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
signalfd(0xffffffffffffff9c, &(0x7f0000000080), 0x8)
finit_module(0xffffffffffffffff, &(0x7f0000000140)="2f6465762f75696e70757400b442b1b7b930bdd7bcc25258a2a3ffb1ca57f90b0e6a03021c2489e08c8a951b2af3203e7d30241a389be58ce9f643c35f39505d53aad1b6a12128de4095e121fbfee734ceeb2501ba6cd697727da67dbbc9a9cd877ae7e05736a97f0275d42ddce2437061c6c08ac5ad634c9349c2339e98b03abb82e928000000", 0x0)
04:40:00 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x5000c}]})
pipe(&(0x7f0000000080))
ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000000c0)=""/231)
04:40:00 executing program 6:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0)
ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100))
04:40:00 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
pipe(&(0x7f0000000400))
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'team_slave_0\x00'})
04:40:00 executing program 7:
ustat(0x0, &(0x7f00000000c0))
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000140))
04:40:00 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0)
fcntl$notify(0xffffffffffffffff, 0x402, 0x0)
04:40:00 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)})
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000100))
04:40:00 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x5000c}]})
pipe(&(0x7f0000000080))
ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000000c0)=""/231)
04:40:00 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
signalfd(0xffffffffffffff9c, &(0x7f0000000080), 0x8)
finit_module(0xffffffffffffffff, &(0x7f0000000140)="2f6465762f75696e70757400b442b1b7b930bdd7bcc25258a2a3ffb1ca57f90b0e6a03021c2489e08c8a951b2af3203e7d30241a389be58ce9f643c35f39505d53aad1b6a12128de4095e121fbfee734ceeb2501ba6cd697727da67dbbc9a9cd877ae7e05736a97f0275d42ddce2437061c6c08ac5ad634c9349c2339e98b03abb82e928000000", 0x0)
04:40:00 executing program 6:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0)
ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100))
04:40:00 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000100)="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")
[ 546.759922] audit: type=1326 audit(1529728800.758:784): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=1920 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:00 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]})
pipe(&(0x7f0000000080))
ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000000c0)=""/231)
04:40:00 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)})
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0)
ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100))
[ 546.822236] audit: type=1326 audit(1529728800.805:785): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=1924 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:00 executing program 7:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]})
ustat(0x0, &(0x7f00000000c0))
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000140))
04:40:00 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0)
fcntl$notify(0xffffffffffffffff, 0x402, 0x0)
04:40:00 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)})
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000100))
[ 546.965660] audit: type=1326 audit(1529728800.914:786): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=1931 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:01 executing program 7:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]})
ustat(0x0, &(0x7f00000000c0))
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000140))
04:40:01 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
finit_module(0xffffffffffffffff, &(0x7f0000000140)="2f6465762f75696e70757400b442b1b7b930bdd7bcc25258a2a3ffb1ca57f90b0e6a03021c2489e08c8a951b2af3203e7d30241a389be58ce9f643c35f39505d53aad1b6a12128de4095e121fbfee734ceeb2501ba6cd697727da67dbbc9a9cd877ae7e05736a97f0275d42ddce2437061c6c08ac5ad634c9349c2339e98b03abb82e928000000", 0x0)
04:40:01 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)})
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0)
ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100))
04:40:01 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)})
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0)
ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100))
04:40:01 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0)
fcntl$notify(0xffffffffffffffff, 0x402, 0x0)
04:40:01 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]})
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000100))
04:40:01 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50192}]})
syz_open_dev$mice(&(0x7f00000002c0)='/dev/input/mice\x00', 0x0, 0x0)
lchown(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
04:40:01 executing program 7:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]})
ustat(0x0, &(0x7f00000000c0))
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000140))
04:40:01 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000100)="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")
04:40:01 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
finit_module(0xffffffffffffffff, &(0x7f0000000140)="2f6465762f75696e70757400b442b1b7b930bdd7bcc25258a2a3ffb1ca57f90b0e6a03021c2489e08c8a951b2af3203e7d30241a389be58ce9f643c35f39505d53aad1b6a12128de4095e121fbfee734ceeb2501ba6cd697727da67dbbc9a9cd877ae7e05736a97f0275d42ddce2437061c6c08ac5ad634c9349c2339e98b03abb82e928000000", 0x0)
[ 547.761560] audit: type=1326 audit(1529728801.760:787): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=1973 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:01 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]})
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000100))
04:40:01 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]})
pipe(&(0x7f0000000080))
ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000000c0)=""/231)
04:40:01 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0)
fcntl$notify(0xffffffffffffffff, 0x402, 0x0)
04:40:01 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]})
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0)
ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100))
04:40:01 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000300)})
ustat(0x0, &(0x7f00000000c0))
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000140))
04:40:01 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
finit_module(0xffffffffffffffff, &(0x7f0000000140)="2f6465762f75696e70757400b442b1b7b930bdd7bcc25258a2a3ffb1ca57f90b0e6a03021c2489e08c8a951b2af3203e7d30241a389be58ce9f643c35f39505d53aad1b6a12128de4095e121fbfee734ceeb2501ba6cd697727da67dbbc9a9cd877ae7e05736a97f0275d42ddce2437061c6c08ac5ad634c9349c2339e98b03abb82e928000000", 0x0)
04:40:02 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]})
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000100))
[ 547.993428] audit: type=1326 audit(1529728801.992:788): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=1993 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:02 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xfffffffffffffde6)
getpeername(0xffffffffffffffff, &(0x7f0000000b80)=@can, &(0x7f0000000c00)=0x80)
04:40:02 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]})
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0)
ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100))
04:40:02 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0)
fcntl$notify(0xffffffffffffffff, 0x402, 0x0)
04:40:02 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000300)})
ustat(0x0, &(0x7f00000000c0))
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000140))
04:40:02 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]})
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0)
ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100))
04:40:02 executing program 2:
signalfd(0xffffffffffffff9c, &(0x7f0000000080), 0x8)
finit_module(0xffffffffffffffff, &(0x7f0000000140)="2f6465762f75696e70757400b442b1b7b930bdd7bcc25258a2a3ffb1ca57f90b0e6a03021c2489e08c8a951b2af3203e7d30241a389be58ce9f643c35f39505d53aad1b6a12128de4095e121fbfee734ceeb2501ba6cd697727da67dbbc9a9cd877ae7e05736a97f0275d42ddce2437061c6c08ac5ad634c9349c2339e98b03abb82e928000000", 0x0)
04:40:02 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]})
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000100))
[ 548.357761] audit: type=1326 audit(1529728802.356:789): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2024 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:02 executing program 2:
signalfd(0xffffffffffffff9c, &(0x7f0000000080), 0x8)
finit_module(0xffffffffffffffff, &(0x7f0000000140)="2f6465762f75696e70757400b442b1b7b930bdd7bcc25258a2a3ffb1ca57f90b0e6a03021c2489e08c8a951b2af3203e7d30241a389be58ce9f643c35f39505d53aad1b6a12128de4095e121fbfee734ceeb2501ba6cd697727da67dbbc9a9cd877ae7e05736a97f0275d42ddce2437061c6c08ac5ad634c9349c2339e98b03abb82e928000000", 0x0)
04:40:02 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000300)})
ustat(0x0, &(0x7f00000000c0))
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000140))
04:40:02 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0)
fcntl$notify(0xffffffffffffffff, 0x402, 0x0)
04:40:02 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]})
pipe(&(0x7f0000000080))
ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000000c0)=""/231)
04:40:02 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]})
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0)
ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100))
04:40:02 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xfffffffffffffde6)
getpeername(0xffffffffffffffff, &(0x7f0000000b80)=@can, &(0x7f0000000c00)=0x80)
04:40:02 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
accept(0xffffffffffffffff, &(0x7f00000000c0)=@ipx, &(0x7f0000000000)=0x80)
sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000007740)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000007700)={&(0x7f0000007500)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0)
04:40:02 executing program 2:
signalfd(0xffffffffffffff9c, &(0x7f0000000080), 0x8)
finit_module(0xffffffffffffffff, &(0x7f0000000140)="2f6465762f75696e70757400b442b1b7b930bdd7bcc25258a2a3ffb1ca57f90b0e6a03021c2489e08c8a951b2af3203e7d30241a389be58ce9f643c35f39505d53aad1b6a12128de4095e121fbfee734ceeb2501ba6cd697727da67dbbc9a9cd877ae7e05736a97f0275d42ddce2437061c6c08ac5ad634c9349c2339e98b03abb82e928000000", 0x0)
04:40:02 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x50355}]})
ustat(0x0, &(0x7f00000000c0))
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000140))
04:40:02 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0)
fcntl$notify(0xffffffffffffffff, 0x402, 0x0)
[ 548.909279] audit: type=1326 audit(1529728802.907:790): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2048 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:03 executing program 2:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
signalfd(0xffffffffffffff9c, &(0x7f0000000080), 0x8)
finit_module(0xffffffffffffffff, &(0x7f0000000140)="2f6465762f75696e70757400b442b1b7b930bdd7bcc25258a2a3ffb1ca57f90b0e6a03021c2489e08c8a951b2af3203e7d30241a389be58ce9f643c35f39505d53aad1b6a12128de4095e121fbfee734ceeb2501ba6cd697727da67dbbc9a9cd877ae7e05736a97f0275d42ddce2437061c6c08ac5ad634c9349c2339e98b03abb82e928000000", 0x0)
04:40:03 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x50355}]})
ustat(0x0, &(0x7f00000000c0))
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000140))
[ 548.980302] audit: type=1326 audit(1529728802.972:791): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2058 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
[ 549.000214] audit: type=1326 audit(1529728802.977:792): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2045 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:03 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xfffffffffffffde6)
getpeername(0xffffffffffffffff, &(0x7f0000000b80)=@can, &(0x7f0000000c00)=0x80)
04:40:03 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
accept(0xffffffffffffffff, &(0x7f00000000c0)=@ipx, &(0x7f0000000000)=0x80)
sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000007740)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000007700)={&(0x7f0000007500)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0)
04:40:03 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x50355}]})
ustat(0x0, &(0x7f00000000c0))
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000140))
04:40:03 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]})
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000100))
04:40:03 executing program 2:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
signalfd(0xffffffffffffff9c, &(0x7f0000000080), 0x8)
finit_module(0xffffffffffffffff, &(0x7f0000000140)="2f6465762f75696e70757400b442b1b7b930bdd7bcc25258a2a3ffb1ca57f90b0e6a03021c2489e08c8a951b2af3203e7d30241a389be58ce9f643c35f39505d53aad1b6a12128de4095e121fbfee734ceeb2501ba6cd697727da67dbbc9a9cd877ae7e05736a97f0275d42ddce2437061c6c08ac5ad634c9349c2339e98b03abb82e928000000", 0x0)
04:40:03 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000580)={{{@in=@loopback}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8)
04:40:03 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
accept(0xffffffffffffffff, &(0x7f00000000c0)=@ipx, &(0x7f0000000000)=0x80)
sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000007740)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000007700)={&(0x7f0000007500)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0)
[ 549.364650] audit: type=1326 audit(1529728803.363:793): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2084 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:03 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]})
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0)
ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100))
04:40:03 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000580)={{{@in=@loopback}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8)
04:40:03 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
accept(0xffffffffffffffff, &(0x7f00000000c0)=@ipx, &(0x7f0000000000)=0x80)
sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000007740)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000007700)={&(0x7f0000007500)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0)
04:40:03 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6}]})
ustat(0x0, &(0x7f00000000c0))
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000140))
04:40:03 executing program 2:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
signalfd(0xffffffffffffff9c, &(0x7f0000000080), 0x8)
finit_module(0xffffffffffffffff, &(0x7f0000000140)="2f6465762f75696e70757400b442b1b7b930bdd7bcc25258a2a3ffb1ca57f90b0e6a03021c2489e08c8a951b2af3203e7d30241a389be58ce9f643c35f39505d53aad1b6a12128de4095e121fbfee734ceeb2501ba6cd697727da67dbbc9a9cd877ae7e05736a97f0275d42ddce2437061c6c08ac5ad634c9349c2339e98b03abb82e928000000", 0x0)
04:40:03 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0)
fcntl$notify(0xffffffffffffffff, 0x402, 0x0)
04:40:03 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]})
syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00')
fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000200))
04:40:03 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
signalfd(0xffffffffffffff9c, &(0x7f0000000080), 0x8)
finit_module(0xffffffffffffffff, &(0x7f0000000140)="2f6465762f75696e70757400b442b1b7b930bdd7bcc25258a2a3ffb1ca57f90b0e6a03021c2489e08c8a951b2af3203e7d30241a389be58ce9f643c35f39505d53aad1b6a12128de4095e121fbfee734ceeb2501ba6cd697727da67dbbc9a9cd877ae7e05736a97f0275d42ddce2437061c6c08ac5ad634c9349c2339e98b03abb82e928000000", 0x0)
04:40:03 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000007740)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000007700)={&(0x7f0000007500)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0)
04:40:04 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000580)={{{@in=@loopback}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8)
04:40:04 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
signalfd(0xffffffffffffff9c, &(0x7f0000000080), 0x8)
finit_module(0xffffffffffffffff, &(0x7f0000000140)="2f6465762f75696e70757400b442b1b7b930bdd7bcc25258a2a3ffb1ca57f90b0e6a03021c2489e08c8a951b2af3203e7d30241a389be58ce9f643c35f39505d53aad1b6a12128de4095e121fbfee734ceeb2501ba6cd697727da67dbbc9a9cd877ae7e05736a97f0275d42ddce2437061c6c08ac5ad634c9349c2339e98b03abb82e928000000", 0x0)
04:40:04 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]})
syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00')
fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000200))
04:40:04 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]})
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000100))
04:40:04 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000007740)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000007700)={&(0x7f0000007500)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0)
04:40:04 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000580)={{{@in=@loopback}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8)
04:40:04 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
signalfd(0xffffffffffffff9c, &(0x7f0000000080), 0x8)
finit_module(0xffffffffffffffff, &(0x7f0000000140)="2f6465762f75696e70757400b442b1b7b930bdd7bcc25258a2a3ffb1ca57f90b0e6a03021c2489e08c8a951b2af3203e7d30241a389be58ce9f643c35f39505d53aad1b6a12128de4095e121fbfee734ceeb2501ba6cd697727da67dbbc9a9cd877ae7e05736a97f0275d42ddce2437061c6c08ac5ad634c9349c2339e98b03abb82e928000000", 0x0)
04:40:04 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6}]})
ustat(0x0, &(0x7f00000000c0))
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000140))
04:40:05 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]})
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0)
ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100))
04:40:05 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]})
syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00')
fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000200))
04:40:05 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
signalfd(0xffffffffffffff9c, &(0x7f0000000080), 0x8)
finit_module(0xffffffffffffffff, &(0x7f0000000140)="2f6465762f75696e70757400b442b1b7b930bdd7bcc25258a2a3ffb1ca57f90b0e6a03021c2489e08c8a951b2af3203e7d30241a389be58ce9f643c35f39505d53aad1b6a12128de4095e121fbfee734ceeb2501ba6cd697727da67dbbc9a9cd877ae7e05736a97f0275d42ddce2437061c6c08ac5ad634c9349c2339e98b03abb82e928000000", 0x0)
04:40:05 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000007740)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000007700)={&(0x7f0000007500)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0)
04:40:05 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0)
fcntl$notify(0xffffffffffffffff, 0x402, 0x0)
04:40:05 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000580)={{{@in=@loopback}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8)
04:40:05 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
signalfd(0xffffffffffffff9c, &(0x7f0000000080), 0x8)
finit_module(0xffffffffffffffff, &(0x7f0000000140)="2f6465762f75696e70757400b442b1b7b930bdd7bcc25258a2a3ffb1ca57f90b0e6a03021c2489e08c8a951b2af3203e7d30241a389be58ce9f643c35f39505d53aad1b6a12128de4095e121fbfee734ceeb2501ba6cd697727da67dbbc9a9cd877ae7e05736a97f0275d42ddce2437061c6c08ac5ad634c9349c2339e98b03abb82e928000000", 0x0)
04:40:05 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
recvmsg(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f00000001c0)=""/62, 0x3e}, 0x0)
04:40:05 executing program 3:
accept(0xffffffffffffffff, &(0x7f00000000c0)=@ipx, &(0x7f0000000000)=0x80)
sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000007740)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000007700)={&(0x7f0000007500)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0)
04:40:05 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]})
syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00')
fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000200))
04:40:05 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000580)={{{@in=@loopback}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8)
04:40:05 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
signalfd(0xffffffffffffff9c, &(0x7f0000000080), 0x8)
finit_module(0xffffffffffffffff, &(0x7f0000000140)="2f6465762f75696e70757400b442b1b7b930bdd7bcc25258a2a3ffb1ca57f90b0e6a03021c2489e08c8a951b2af3203e7d30241a389be58ce9f643c35f39505d53aad1b6a12128de4095e121fbfee734ceeb2501ba6cd697727da67dbbc9a9cd877ae7e05736a97f0275d42ddce2437061c6c08ac5ad634c9349c2339e98b03abb82e928000000", 0x0)
04:40:05 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
recvmsg(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f00000001c0)=""/62, 0x3e}, 0x0)
04:40:05 executing program 3:
accept(0xffffffffffffffff, &(0x7f00000000c0)=@ipx, &(0x7f0000000000)=0x80)
sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000007740)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000007700)={&(0x7f0000007500)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0)
04:40:05 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
signalfd(0xffffffffffffff9c, &(0x7f0000000080), 0x8)
finit_module(0xffffffffffffffff, &(0x7f0000000140)="2f6465762f75696e70757400b442b1b7b930bdd7bcc25258a2a3ffb1ca57f90b0e6a03021c2489e08c8a951b2af3203e7d30241a389be58ce9f643c35f39505d53aad1b6a12128de4095e121fbfee734ceeb2501ba6cd697727da67dbbc9a9cd877ae7e05736a97f0275d42ddce2437061c6c08ac5ad634c9349c2339e98b03abb82e928000000", 0x0)
[ 551.827958] kauditd_printk_skb: 7 callbacks suppressed
[ 551.827978] audit: type=1326 audit(1529728805.826:801): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2206 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:05 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6}]})
ustat(0x0, &(0x7f00000000c0))
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000140))
04:40:05 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]})
fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000200))
04:40:05 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000580)={{{@in=@loopback}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8)
04:40:05 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
recvmsg(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f00000001c0)=""/62, 0x3e}, 0x0)
04:40:05 executing program 3:
accept(0xffffffffffffffff, &(0x7f00000000c0)=@ipx, &(0x7f0000000000)=0x80)
sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000007740)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000007700)={&(0x7f0000007500)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0)
04:40:05 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]})
request_key(&(0x7f0000000140)='blacklist\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000200)='*:\x00', 0xfffffffffffffffc)
open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0)
[ 552.054537] audit: type=1326 audit(1529728806.053:802): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2215 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:06 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000100)=""/185)
04:40:06 executing program 0:
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000580)={{{@in=@loopback}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8)
04:40:06 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]})
fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000200))
04:40:06 executing program 3:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
accept(0xffffffffffffffff, &(0x7f00000000c0)=@ipx, &(0x7f0000000000)=0x80)
sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000007740)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000007700)={&(0x7f0000007500)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0)
04:40:06 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]})
openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0)
setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000040), 0x10)
04:40:06 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
recvmsg(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f00000001c0)=""/62, 0x3e}, 0x0)
04:40:06 executing program 0:
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000580)={{{@in=@loopback}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8)
04:40:06 executing program 3:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
accept(0xffffffffffffffff, &(0x7f00000000c0)=@ipx, &(0x7f0000000000)=0x80)
sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000007740)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000007700)={&(0x7f0000007500)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0)
04:40:06 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]})
fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000200))
04:40:06 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
signalfd(0xffffffffffffff9c, &(0x7f0000000080), 0x8)
finit_module(0xffffffffffffffff, &(0x7f0000000140)="2f6465762f75696e70757400b442b1b7b930bdd7bcc25258a2a3ffb1ca57f90b0e6a03021c2489e08c8a951b2af3203e7d30241a389be58ce9f643c35f39505d53aad1b6a12128de4095e121fbfee734ceeb2501ba6cd697727da67dbbc9a9cd877ae7e05736a97f0275d42ddce2437061c6c08ac5ad634c9349c2339e98b03abb82e928000000", 0x0)
[ 552.769842] audit: type=1326 audit(1529728806.768:803): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2263 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:06 executing program 1:
syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00')
fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000200))
04:40:06 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
prlimit64(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080))
04:40:06 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000100)=""/185)
04:40:06 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50355}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0)
sendto$inet(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000140)={0x2, 0x0, @multicast2=0xe0000002}, 0x10)
04:40:06 executing program 3:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
accept(0xffffffffffffffff, &(0x7f00000000c0)=@ipx, &(0x7f0000000000)=0x80)
sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000007740)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000007700)={&(0x7f0000007500)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0)
04:40:06 executing program 0:
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000580)={{{@in=@loopback}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8)
04:40:07 executing program 0:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000580)={{{@in=@loopback}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8)
04:40:07 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
accept(0xffffffffffffffff, &(0x7f00000000c0)=@ipx, &(0x7f0000000000)=0x80)
sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000007740)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000007700)={&(0x7f0000007500)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0)
04:40:07 executing program 1:
syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00')
fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000200))
04:40:07 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000100)=""/185)
04:40:07 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
prlimit64(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080))
04:40:07 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]})
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000040))
04:40:07 executing program 1:
syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00')
fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000200))
04:40:07 executing program 0:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000580)={{{@in=@loopback}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8)
04:40:07 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
accept(0xffffffffffffffff, &(0x7f00000000c0)=@ipx, &(0x7f0000000000)=0x80)
sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000007740)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000007700)={&(0x7f0000007500)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0)
04:40:07 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
signalfd(0xffffffffffffff9c, &(0x7f0000000080), 0x8)
finit_module(0xffffffffffffffff, &(0x7f0000000140)="2f6465762f75696e70757400b442b1b7b930bdd7bcc25258a2a3ffb1ca57f90b0e6a03021c2489e08c8a951b2af3203e7d30241a389be58ce9f643c35f39505d53aad1b6a12128de4095e121fbfee734ceeb2501ba6cd697727da67dbbc9a9cd877ae7e05736a97f0275d42ddce2437061c6c08ac5ad634c9349c2339e98b03abb82e928000000", 0x0)
04:40:07 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
prlimit64(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080))
04:40:07 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]})
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000040))
04:40:07 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000100)=""/185)
04:40:07 executing program 0:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000580)={{{@in=@loopback}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8)
04:40:07 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]})
syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00')
fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000200))
04:40:07 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
accept(0xffffffffffffffff, &(0x7f00000000c0)=@ipx, &(0x7f0000000000)=0x80)
sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000007740)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000007700)={&(0x7f0000007500)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0)
04:40:07 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)})
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000580)={{{@in=@loopback}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8)
[ 553.753964] audit: type=1326 audit(1529728807.752:804): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2329 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:07 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]})
syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00')
fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000200))
04:40:07 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
accept(0xffffffffffffffff, &(0x7f00000000c0)=@ipx, &(0x7f0000000000)=0x80)
sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000007740)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000007700)={&(0x7f0000007500)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0)
04:40:07 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
prlimit64(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080))
04:40:07 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000100)=""/185)
04:40:07 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]})
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000040))
04:40:07 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)})
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000580)={{{@in=@loopback}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8)
04:40:08 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]})
syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00')
fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000200))
04:40:08 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
accept(0xffffffffffffffff, &(0x7f00000000c0)=@ipx, &(0x7f0000000000)=0x80)
sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000007740)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000007700)={&(0x7f0000007500)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0)
04:40:08 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000100)=""/185)
04:40:08 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)})
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000580)={{{@in=@loopback}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8)
04:40:08 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
prlimit64(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080))
04:40:08 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]})
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000040))
04:40:08 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
accept(0xffffffffffffffff, &(0x7f00000000c0)=@ipx, &(0x7f0000000000)=0x80)
sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000007740)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000007700)={&(0x7f0000007500)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0)
04:40:08 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)})
syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00')
fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000200))
04:40:08 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]})
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000580)={{{@in=@loopback}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8)
04:40:08 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)})
syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00')
fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000200))
04:40:08 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
accept(0xffffffffffffffff, &(0x7f00000000c0)=@ipx, &(0x7f0000000000)=0x80)
sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000007740)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000007700)={&(0x7f0000007500)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0)
04:40:08 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000100)=""/185)
04:40:08 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]})
ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000040))
04:40:08 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
prlimit64(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080))
[ 554.855105] audit: type=1326 audit(1529728808.853:805): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2383 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:08 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)})
syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00')
fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000200))
04:40:09 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]})
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000580)={{{@in=@loopback}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8)
04:40:09 executing program 6:
openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000100)=""/185)
04:40:09 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
socket$inet6(0xa, 0x0, 0x0)
getsockname(0xffffffffffffffff, &(0x7f0000001200)=@in={0x0, 0x0, @rand_addr}, &(0x7f0000001280)=0x80)
04:40:09 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4080000000000006, 0x0, 0x0, 0x800050209}]})
socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000))
getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4)
04:40:09 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]})
ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000040))
04:40:09 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]})
syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00')
fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000200))
04:40:09 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
prlimit64(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080))
04:40:09 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]})
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000580)={{{@in=@loopback}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8)
04:40:09 executing program 6:
openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000100)=""/185)
04:40:09 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]})
ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000040))
04:40:09 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4080000000000006, 0x0, 0x0, 0x800050209}]})
socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000))
getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4)
04:40:09 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
accept(0xffffffffffffffff, &(0x7f00000000c0)=@ipx, &(0x7f0000000000)=0x80)
sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000007740)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000007700)={&(0x7f0000007500)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0)
04:40:09 executing program 4:
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
prlimit64(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080))
04:40:09 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]})
syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00')
fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000200))
04:40:09 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]})
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000580)={{{@in=@loopback}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8)
04:40:09 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
socket$inet6(0xa, 0x0, 0x0)
getsockname(0xffffffffffffffff, &(0x7f0000001200)=@in={0x0, 0x0, @rand_addr}, &(0x7f0000001280)=0x80)
04:40:09 executing program 6:
openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000100)=""/185)
04:40:09 executing program 5:
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000040))
04:40:09 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4080000000000006, 0x0, 0x0, 0x800050209}]})
socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000))
getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4)
[ 555.773352] audit: type=1326 audit(1529728809.771:806): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2440 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:09 executing program 6:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000100)=""/185)
04:40:09 executing program 4:
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
prlimit64(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080))
[ 555.865317] audit: type=1326 audit(1529728809.823:807): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2444 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:09 executing program 5:
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000040))
04:40:09 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]})
syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00')
fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000200))
04:40:10 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4080000000000006, 0x0, 0x0, 0x800050209}]})
socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000))
getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4)
04:40:10 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
socket$inet6(0xa, 0x0, 0x0)
getsockname(0xffffffffffffffff, &(0x7f0000001200)=@in={0x0, 0x0, @rand_addr}, &(0x7f0000001280)=0x80)
04:40:10 executing program 4:
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
prlimit64(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080))
04:40:10 executing program 6:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000100)=""/185)
04:40:10 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
accept(0xffffffffffffffff, &(0x7f00000000c0)=@ipx, &(0x7f0000000000)=0x80)
sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000007740)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000007700)={&(0x7f0000007500)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0)
04:40:10 executing program 5:
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000040))
04:40:10 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]})
syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00')
fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000200))
04:40:10 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]})
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000580)={{{@in=@loopback}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8)
04:40:10 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
socket$inet6(0xa, 0x0, 0x0)
getsockname(0xffffffffffffffff, &(0x7f0000001200)=@in={0x0, 0x0, @rand_addr}, &(0x7f0000001280)=0x80)
04:40:10 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4080000000000006, 0x0, 0x0, 0x800050209}]})
getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4)
04:40:10 executing program 4:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
prlimit64(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080))
04:40:10 executing program 6:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000100)=""/185)
[ 556.701503] audit: type=1326 audit(1529728810.700:808): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2489 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
[ 556.730389] audit: type=1326 audit(1529728810.728:809): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2493 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:10 executing program 5:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]})
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000040))
[ 556.817384] audit: type=1326 audit(1529728810.816:810): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2503 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:10 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000100)=""/185)
04:40:10 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
getsockname(0xffffffffffffffff, &(0x7f0000001200)=@in={0x0, 0x0, @rand_addr}, &(0x7f0000001280)=0x80)
04:40:10 executing program 4:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
prlimit64(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080))
04:40:10 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4080000000000006, 0x0, 0x0, 0x800050209}]})
getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4)
04:40:11 executing program 5:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]})
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000040))
04:40:11 executing program 4:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
prlimit64(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080))
04:40:11 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
getsockname(0xffffffffffffffff, &(0x7f0000001200)=@in={0x0, 0x0, @rand_addr}, &(0x7f0000001280)=0x80)
04:40:11 executing program 5:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]})
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000040))
04:40:11 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000100)=""/185)
04:40:11 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]})
syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00')
fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000200))
04:40:11 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]})
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000580)={{{@in=@loopback}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8)
04:40:11 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4080000000000006, 0x0, 0x0, 0x800050209}]})
getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4)
04:40:11 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
prlimit64(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080))
04:40:11 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
getsockname(0xffffffffffffffff, &(0x7f0000001200)=@in={0x0, 0x0, @rand_addr}, &(0x7f0000001280)=0x80)
04:40:11 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
fcntl$getown(0xffffffffffffff9c, 0x9)
chown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
04:40:11 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000100)=""/185)
04:40:11 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)})
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000040))
[ 557.715443] audit: type=1326 audit(1529728811.714:811): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2546 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:11 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000100)=""/185)
[ 557.814119] audit: type=1326 audit(1529728811.812:812): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2551 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:11 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)})
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000040))
04:40:11 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
prlimit64(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080))
04:40:11 executing program 7:
socket$inet6(0xa, 0x0, 0x0)
getsockname(0xffffffffffffffff, &(0x7f0000001200)=@in={0x0, 0x0, @rand_addr}, &(0x7f0000001280)=0x80)
04:40:11 executing program 2:
socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000))
getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4)
04:40:12 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
fcntl$getown(0xffffffffffffff9c, 0x9)
chown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
04:40:12 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)})
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000040))
04:40:12 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000100)=""/185)
04:40:12 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]})
syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00')
fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000200))
04:40:12 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
fcntl$getown(0xffffffffffffff9c, 0x9)
chown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
04:40:12 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
prlimit64(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080))
04:40:12 executing program 2:
socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000))
getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4)
[ 558.636200] audit: type=1326 audit(1529728812.634:813): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2598 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:12 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000100)=""/185)
04:40:12 executing program 7:
socket$inet6(0xa, 0x0, 0x0)
getsockname(0xffffffffffffffff, &(0x7f0000001200)=@in={0x0, 0x0, @rand_addr}, &(0x7f0000001280)=0x80)
04:40:12 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x5023f}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0)
ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000080)=""/36)
04:40:12 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]})
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000040))
04:40:12 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]})
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000040))
04:40:12 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
prlimit64(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080))
04:40:12 executing program 2:
socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000))
getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4)
04:40:12 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000100)=""/185)
04:40:12 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
fcntl$getown(0xffffffffffffff9c, 0x9)
chown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
04:40:12 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x5023f}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0)
ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000080)=""/36)
[ 558.963327] audit: type=1326 audit(1529728812.961:814): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2626 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:13 executing program 7:
socket$inet6(0xa, 0x0, 0x0)
getsockname(0xffffffffffffffff, &(0x7f0000001200)=@in={0x0, 0x0, @rand_addr}, &(0x7f0000001280)=0x80)
04:40:13 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]})
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000040))
04:40:13 executing program 7:
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
socket$inet6(0xa, 0x0, 0x0)
getsockname(0xffffffffffffffff, &(0x7f0000001200)=@in={0x0, 0x0, @rand_addr}, &(0x7f0000001280)=0x80)
04:40:13 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
prlimit64(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080))
04:40:13 executing program 2:
seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4080000000000006, 0x0, 0x0, 0x800050209}]})
socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000))
getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4)
04:40:13 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
chown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
04:40:13 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]})
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000040))
04:40:13 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x5023f}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0)
ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000080)=""/36)
04:40:13 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018b}]})
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)="4018726f632f7079732f6e65742f697076342f76732f63616368655f627970617373002db83bf6bbf88f19a61123d9812450c853852e25b550d6d5b526876eb383d6b2cdbb3afe303abaf8b48358f5920a091e010fcaeb30b104f8d01647e88ffd9fa0d085a9aecd3880f525232c495cb9d8a4f859d0d439e9bda89a82ca1eaf58f3cb4d68578d4eb623c72eb7aff4d10e3b6890c6066313517c2ff503567f455d8fe9c952739d9dc34fc8adc3e27f78d28b91be68e2a9ad91b5f8744823e7e83a9a4861b755", 0x2, 0x0)
ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f0000000080))
[ 559.593976] audit: type=1326 audit(1529728813.592:815): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2656 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:13 executing program 2:
seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4080000000000006, 0x0, 0x0, 0x800050209}]})
socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000))
getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4)
04:40:13 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
prlimit64(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080))
04:40:13 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x5023f}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0)
ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000080)=""/36)
04:40:13 executing program 7:
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
socket$inet6(0xa, 0x0, 0x0)
getsockname(0xffffffffffffffff, &(0x7f0000001200)=@in={0x0, 0x0, @rand_addr}, &(0x7f0000001280)=0x80)
04:40:13 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000100)=""/185)
04:40:13 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
chown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
04:40:13 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50350}]})
pipe(&(0x7f0000000000))
accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14)
04:40:13 executing program 2:
seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4080000000000006, 0x0, 0x0, 0x800050209}]})
socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000))
getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4)
04:40:13 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
prlimit64(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080))
[ 559.982144] audit: type=1326 audit(1529728813.980:816): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2694 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:14 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x5023f}]})
ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000080)=""/36)
04:40:14 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)})
socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000))
getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4)
04:40:14 executing program 7:
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
socket$inet6(0xa, 0x0, 0x0)
getsockname(0xffffffffffffffff, &(0x7f0000001200)=@in={0x0, 0x0, @rand_addr}, &(0x7f0000001280)=0x80)
[ 560.065956] audit: type=1326 audit(1529728814.028:817): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2696 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:14 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
chown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
04:40:14 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]})
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000040))
04:40:14 executing program 3:
fcntl$getown(0xffffffffffffff9c, 0x9)
chown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
04:40:14 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50350}]})
pipe(&(0x7f0000000000))
accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14)
04:40:14 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)})
socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000))
getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4)
04:40:14 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x5023f}]})
ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000080)=""/36)
04:40:14 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)})
socket$inet6(0xa, 0x0, 0x0)
getsockname(0xffffffffffffffff, &(0x7f0000001200)=@in={0x0, 0x0, @rand_addr}, &(0x7f0000001280)=0x80)
04:40:14 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)})
socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000))
getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4)
[ 560.580523] audit: type=1326 audit(1529728814.579:818): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2733 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:14 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000100)=""/185)
04:40:14 executing program 3:
fcntl$getown(0xffffffffffffff9c, 0x9)
chown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
04:40:14 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x5023f}]})
ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000080)=""/36)
04:40:14 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50350}]})
pipe(&(0x7f0000000000))
accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14)
04:40:14 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)})
socket$inet6(0xa, 0x0, 0x0)
getsockname(0xffffffffffffffff, &(0x7f0000001200)=@in={0x0, 0x0, @rand_addr}, &(0x7f0000001280)=0x80)
04:40:14 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]})
socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000))
getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4)
04:40:14 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
prlimit64(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080))
[ 560.971950] audit: type=1326 audit(1529728814.970:819): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2755 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:15 executing program 3:
fcntl$getown(0xffffffffffffff9c, 0x9)
chown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
[ 561.038759] audit: type=1326 audit(1529728815.011:820): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2759 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:15 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50350}]})
pipe(&(0x7f0000000000))
accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14)
04:40:15 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)})
socket$inet6(0xa, 0x0, 0x0)
getsockname(0xffffffffffffffff, &(0x7f0000001200)=@in={0x0, 0x0, @rand_addr}, &(0x7f0000001280)=0x80)
04:40:15 executing program 3:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
fcntl$getown(0xffffffffffffff9c, 0x9)
chown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
04:40:15 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]})
socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000))
getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4)
04:40:15 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]})
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000040))
04:40:15 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50350}]})
accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14)
04:40:15 executing program 0:
openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0)
ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000080)=""/36)
04:40:15 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]})
socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000))
getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4)
04:40:15 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50350}]})
accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14)
04:40:15 executing program 3:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
fcntl$getown(0xffffffffffffff9c, 0x9)
chown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
04:40:15 executing program 0:
openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0)
ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000080)=""/36)
04:40:15 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]})
socket$inet6(0xa, 0x0, 0x0)
getsockname(0xffffffffffffffff, &(0x7f0000001200)=@in={0x0, 0x0, @rand_addr}, &(0x7f0000001280)=0x80)
04:40:15 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4080000000000006}]})
socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000))
getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4)
04:40:15 executing program 6:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x1, 0x1b0, [0x0, 0x200000c0, 0x20000240, 0x20000270], 0x0, &(0x7f0000000040), &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_1\x00', 'veth1_to_team\x00', 'ip_vti0\x00', 'tunl0\x00', @random="5db0ba403af9", [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0xc0, 0xf0, 0x120, [@nfacct={'nfacct\x00', 0x28, {{'syz1\x00'}}}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@STANDARD={'\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x228)
04:40:15 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
prlimit64(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080))
04:40:16 executing program 3:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
fcntl$getown(0xffffffffffffff9c, 0x9)
chown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
04:40:16 executing program 0:
openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0)
ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000080)=""/36)
[ 561.998507] kernel msg: ebtables bug: please report to author: Valid hook without chain
04:40:16 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50350}]})
accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14)
04:40:16 executing program 1:
pipe(&(0x7f0000000000))
accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14)
04:40:16 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]})
socket$inet6(0xa, 0x0, 0x0)
getsockname(0xffffffffffffffff, &(0x7f0000001200)=@in={0x0, 0x0, @rand_addr}, &(0x7f0000001280)=0x80)
04:40:16 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]})
bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c)
setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f00000001c0), 0x10)
04:40:16 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
fcntl$getown(0xffffffffffffff9c, 0x9)
chown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
04:40:16 executing program 0:
seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x5023f}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0)
ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000080)=""/36)
04:40:16 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50355}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
04:40:16 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
fcntl$getown(0xffffffffffffff9c, 0x9)
chown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
04:40:16 executing program 0:
seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x5023f}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0)
ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000080)=""/36)
04:40:16 executing program 1:
pipe(&(0x7f0000000000))
accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14)
04:40:16 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]})
socket$inet6(0xa, 0x0, 0x0)
getsockname(0xffffffffffffffff, &(0x7f0000001200)=@in={0x0, 0x0, @rand_addr}, &(0x7f0000001280)=0x80)
04:40:16 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4080000000000006}]})
socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000))
getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4)
04:40:16 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
fcntl$getown(0xffffffffffffff9c, 0x9)
chown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
04:40:16 executing program 1:
pipe(&(0x7f0000000000))
accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14)
04:40:16 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]})
ustat(0x0, &(0x7f0000000000))
sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0)
04:40:16 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50355}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
04:40:16 executing program 0:
seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x5023f}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0)
ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000080)=""/36)
04:40:16 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]})
creat(&(0x7f0000000600)='./file0\x00', 0x0)
sched_yield()
[ 562.984142] kauditd_printk_skb: 3 callbacks suppressed
[ 562.984164] audit: type=1326 audit(1529728816.982:824): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2885 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:17 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]})
socket$inet6(0xa, 0x0, 0x0)
getsockname(0xffffffffffffffff, &(0x7f0000001200)=@in={0x0, 0x0, @rand_addr}, &(0x7f0000001280)=0x80)
04:40:17 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
fcntl$getown(0xffffffffffffff9c, 0x9)
chown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
04:40:17 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50350}]})
pipe(&(0x7f0000000000))
accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14)
04:40:17 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)})
openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0)
ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000080)=""/36)
[ 563.106449] audit: type=1326 audit(1529728817.105:825): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2890 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:17 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50355}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
04:40:17 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]})
creat(&(0x7f0000000600)='./file0\x00', 0x0)
sched_yield()
04:40:17 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
add_key(&(0x7f0000001880)='id_resolver\x00', &(0x7f00000018c0)={0x73, 0x79, 0x7a}, &(0x7f0000001900), 0x0, 0xfffffffffffffffd)
ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0)
04:40:17 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
fcntl$getown(0xffffffffffffff9c, 0x9)
chown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
04:40:17 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50350}]})
pipe(&(0x7f0000000000))
accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14)
04:40:17 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4080000000000006}]})
socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000))
getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4)
04:40:17 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)})
openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0)
ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000080)=""/36)
04:40:17 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]})
creat(&(0x7f0000000600)='./file0\x00', 0x0)
sched_yield()
04:40:17 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
add_key(&(0x7f0000001880)='id_resolver\x00', &(0x7f00000018c0)={0x73, 0x79, 0x7a}, &(0x7f0000001900), 0x0, 0xfffffffffffffffd)
ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0)
04:40:17 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50355}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
04:40:17 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50350}]})
pipe(&(0x7f0000000000))
accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14)
04:40:17 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
fcntl$getown(0xffffffffffffff9c, 0x9)
chown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
[ 563.965785] audit: type=1326 audit(1529728817.964:826): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2938 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:18 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]})
socket$inet6(0xa, 0x0, 0x0)
getsockname(0xffffffffffffffff, &(0x7f0000001200)=@in={0x0, 0x0, @rand_addr}, &(0x7f0000001280)=0x80)
04:40:18 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)})
openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0)
ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000080)=""/36)
04:40:18 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
fcntl$getown(0xffffffffffffff9c, 0x9)
chown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
04:40:18 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000080)})
pipe(&(0x7f0000000000))
accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14)
04:40:18 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0)
04:40:18 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50355}]})
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
[ 564.093241] audit: type=1326 audit(1529728818.091:827): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2942 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:18 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]})
creat(&(0x7f0000000600)='./file0\x00', 0x0)
sched_yield()
[ 564.220819] audit: type=1326 audit(1529728818.205:828): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2947 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:18 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x5023f}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0)
ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000080)=""/36)
04:40:18 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000080)})
pipe(&(0x7f0000000000))
accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14)
04:40:18 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0)
04:40:18 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50355}]})
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
04:40:18 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x5023f}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0)
ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000080)=""/36)
04:40:18 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]})
sched_yield()
04:40:18 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000080)})
pipe(&(0x7f0000000000))
accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14)
04:40:18 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5009f}]})
mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
read$eventfd(0xffffffffffffffff, &(0x7f0000000240), 0x8)
04:40:18 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x50350}]})
pipe(&(0x7f0000000000))
accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14)
04:40:19 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]})
socket$inet6(0xa, 0x0, 0x0)
getsockname(0xffffffffffffffff, &(0x7f0000001200)=@in={0x0, 0x0, @rand_addr}, &(0x7f0000001280)=0x80)
04:40:19 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x5023f}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0)
ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000080)=""/36)
04:40:19 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50355}]})
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
04:40:19 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
fcntl$getown(0xffffffffffffff9c, 0x9)
chown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
04:40:19 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0)
04:40:19 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]})
sched_yield()
04:40:19 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5009f}]})
mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
read$eventfd(0xffffffffffffffff, &(0x7f0000000240), 0x8)
04:40:19 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x50350}]})
pipe(&(0x7f0000000000))
accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14)
[ 565.175616] audit: type=1326 audit(1529728819.172:829): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2997 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
[ 565.257682] audit: type=1326 audit(1529728819.256:830): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3008 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:19 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0)
ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000080)=""/36)
04:40:19 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]})
sched_yield()
04:40:19 executing program 5:
openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
04:40:19 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5009f}]})
mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
read$eventfd(0xffffffffffffffff, &(0x7f0000000240), 0x8)
04:40:19 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x50350}]})
pipe(&(0x7f0000000000))
accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14)
04:40:19 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0)
[ 565.412822] audit: type=1326 audit(1529728819.411:831): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3019 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:19 executing program 5:
openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
04:40:19 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]})
pipe(&(0x7f0000000000))
accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14)
[ 565.623997] audit: type=1326 audit(1529728819.622:832): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3037 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:20 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
fcntl$getown(0xffffffffffffff9c, 0x9)
chown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
04:40:20 executing program 4:
creat(&(0x7f0000000600)='./file0\x00', 0x0)
sched_yield()
04:40:20 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5009f}]})
mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
read$eventfd(0xffffffffffffffff, &(0x7f0000000240), 0x8)
04:40:20 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0)
04:40:20 executing program 5:
openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
04:40:20 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0)
ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f00000001c0)={0x0, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @multicast1=0xe0000001}, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)='vcan0\x00'})
[ 566.172573] audit: type=1326 audit(1529728820.171:833): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3051 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:20 executing program 4:
creat(&(0x7f0000000600)='./file0\x00', 0x0)
sched_yield()
04:40:20 executing program 5:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50355}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
04:40:20 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0)
ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000080)=""/36)
04:40:20 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0)
04:40:20 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5009f}]})
read$eventfd(0xffffffffffffffff, &(0x7f0000000240), 0x8)
04:40:20 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0)
ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f00000001c0)={0x0, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @multicast1=0xe0000001}, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)='vcan0\x00'})
04:40:20 executing program 5:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50355}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
04:40:20 executing program 4:
creat(&(0x7f0000000600)='./file0\x00', 0x0)
sched_yield()
04:40:20 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]})
pipe(&(0x7f0000000000))
accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14)
04:40:20 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0)
04:40:21 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5009f}]})
read$eventfd(0xffffffffffffffff, &(0x7f0000000240), 0x8)
04:40:21 executing program 4:
seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]})
creat(&(0x7f0000000600)='./file0\x00', 0x0)
sched_yield()
04:40:21 executing program 5:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50355}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
04:40:21 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000000c0)=@abs, 0x6e)
04:40:21 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0)
ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000140))
04:40:21 executing program 6:
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0)
04:40:21 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040))
openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
04:40:21 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5009f}]})
read$eventfd(0xffffffffffffffff, &(0x7f0000000240), 0x8)
04:40:21 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0)
ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000080)=""/36)
04:40:21 executing program 4:
seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]})
creat(&(0x7f0000000600)='./file0\x00', 0x0)
sched_yield()
04:40:21 executing program 6:
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0)
04:40:21 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000000c0)=@abs, 0x6e)
04:40:21 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0)
ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000140))
04:40:21 executing program 2:
mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
read$eventfd(0xffffffffffffffff, &(0x7f0000000240), 0x8)
04:40:21 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]})
pipe(&(0x7f0000000000))
accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14)
04:40:21 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040))
openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
04:40:21 executing program 2:
mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
read$eventfd(0xffffffffffffffff, &(0x7f0000000240), 0x8)
04:40:21 executing program 6:
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0)
04:40:21 executing program 4:
seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]})
creat(&(0x7f0000000600)='./file0\x00', 0x0)
sched_yield()
04:40:21 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0)
ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000140))
04:40:21 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000000c0)=@abs, 0x6e)
04:40:21 executing program 6:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0)
04:40:21 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)})
creat(&(0x7f0000000600)='./file0\x00', 0x0)
sched_yield()
04:40:21 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0)
ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000140))
04:40:22 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000140))
04:40:22 executing program 2:
mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
read$eventfd(0xffffffffffffffff, &(0x7f0000000240), 0x8)
04:40:22 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)})
creat(&(0x7f0000000600)='./file0\x00', 0x0)
sched_yield()
04:40:22 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040))
openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
04:40:22 executing program 6:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0)
04:40:22 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000000c0)=@abs, 0x6e)
04:40:22 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50355}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
04:40:22 executing program 6:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0)
04:40:22 executing program 2:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5009f}]})
mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
read$eventfd(0xffffffffffffffff, &(0x7f0000000240), 0x8)
04:40:22 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)})
creat(&(0x7f0000000600)='./file0\x00', 0x0)
sched_yield()
04:40:22 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000140))
04:40:22 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
sendto$unix(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000000c0)=@abs, 0x6e)
04:40:22 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50355}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
04:40:22 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ad}]})
creat(&(0x7f0000000600)='./file0\x00', 0x0)
sched_yield()
04:40:22 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0)
04:40:22 executing program 2:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5009f}]})
mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
read$eventfd(0xffffffffffffffff, &(0x7f0000000240), 0x8)
04:40:22 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
sendto$unix(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000000c0)=@abs, 0x6e)
04:40:22 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000140))
04:40:22 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50355}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
04:40:22 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ad}]})
creat(&(0x7f0000000600)='./file0\x00', 0x0)
sched_yield()
04:40:22 executing program 2:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5009f}]})
mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
read$eventfd(0xffffffffffffffff, &(0x7f0000000240), 0x8)
04:40:22 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0)
04:40:23 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
sendto$unix(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000000c0)=@abs, 0x6e)
04:40:23 executing program 7:
openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0)
ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000140))
04:40:23 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0)
04:40:23 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
04:40:23 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ad}]})
creat(&(0x7f0000000600)='./file0\x00', 0x0)
sched_yield()
04:40:23 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
read$eventfd(0xffffffffffffffff, &(0x7f0000000240), 0x8)
04:40:23 executing program 7:
openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0)
ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000140))
04:40:23 executing program 3:
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000000c0)=@abs, 0x6e)
[ 569.178675] kauditd_printk_skb: 4 callbacks suppressed
[ 569.178733] audit: type=1326 audit(1529728823.177:838): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3250 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:23 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0)
04:40:23 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]})
creat(&(0x7f0000000600)='./file0\x00', 0x0)
sched_yield()
04:40:23 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
read$eventfd(0xffffffffffffffff, &(0x7f0000000240), 0x8)
[ 569.340752] audit: type=1326 audit(1529728823.339:839): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3267 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:23 executing program 3:
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000000c0)=@abs, 0x6e)
04:40:23 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
read$eventfd(0xffffffffffffffff, &(0x7f0000000240), 0x8)
04:40:23 executing program 7:
openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0)
ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000140))
04:40:23 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0)
04:40:23 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50350}]})
pipe(&(0x7f0000000000))
ioperm(0x0, 0x0, 0x0)
04:40:23 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
prctl$setptracer(0x59616d61, 0x0)
socket$inet_udp(0x2, 0x2, 0x0)
04:40:23 executing program 3:
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000000c0)=@abs, 0x6e)
04:40:23 executing program 7:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0)
ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000140))
04:40:24 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
04:40:24 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5009f}]})
mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
read$eventfd(0xffffffffffffffff, &(0x7f0000000240), 0x8)
04:40:24 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0)
04:40:24 executing program 7:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0)
ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000140))
04:40:24 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50350}]})
pipe(&(0x7f0000000000))
ioperm(0x0, 0x0, 0x0)
04:40:24 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
prctl$setptracer(0x59616d61, 0x0)
socket$inet_udp(0x2, 0x2, 0x0)
[ 570.116535] audit: type=1326 audit(1529728824.115:840): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3314 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:24 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]})
creat(&(0x7f0000000600)='./file0\x00', 0x0)
sched_yield()
04:40:24 executing program 3:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000000c0)=@abs, 0x6e)
04:40:24 executing program 7:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0)
ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000140))
04:40:24 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5009f}]})
mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
read$eventfd(0xffffffffffffffff, &(0x7f0000000240), 0x8)
04:40:24 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0)
04:40:24 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50350}]})
pipe(&(0x7f0000000000))
ioperm(0x0, 0x0, 0x0)
04:40:24 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
prctl$setptracer(0x59616d61, 0x0)
socket$inet_udp(0x2, 0x2, 0x0)
[ 570.322587] audit: type=1326 audit(1529728824.321:841): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3325 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:24 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)})
openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0)
ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000140))
04:40:24 executing program 3:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000000c0)=@abs, 0x6e)
[ 570.393170] audit: type=1326 audit(1529728824.381:842): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3324 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:24 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5009f}]})
mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
read$eventfd(0xffffffffffffffff, &(0x7f0000000240), 0x8)
04:40:25 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50350}]})
pipe(&(0x7f0000000000))
ioperm(0x0, 0x0, 0x0)
04:40:25 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
read$eventfd(0xffffffffffffffff, &(0x7f0000000240), 0x8)
04:40:25 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
prctl$setptracer(0x59616d61, 0x0)
socket$inet_udp(0x2, 0x2, 0x0)
04:40:25 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)})
openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0)
ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000140))
04:40:25 executing program 3:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000000c0)=@abs, 0x6e)
04:40:25 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
[ 571.047801] audit: type=1326 audit(1529728825.046:843): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3352 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
[ 571.107687] audit: type=1326 audit(1529728825.091:844): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3361 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:25 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000000c0)=@abs, 0x6e)
04:40:25 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50350}]})
ioperm(0x0, 0x0, 0x0)
04:40:25 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
socket$inet_udp(0x2, 0x2, 0x0)
04:40:25 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)})
openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0)
ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000140))
04:40:25 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0)
04:40:25 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]})
creat(&(0x7f0000000600)='./file0\x00', 0x0)
sched_yield()
[ 571.306639] audit: type=1326 audit(1529728825.305:845): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3375 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:25 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000000c0)=@abs, 0x6e)
04:40:25 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]})
openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0)
ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000140))
[ 571.363970] audit: type=1326 audit(1529728825.359:846): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3383 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:25 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
socket$inet_udp(0x2, 0x2, 0x0)
04:40:25 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50350}]})
ioperm(0x0, 0x0, 0x0)
04:40:25 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000000c0)=@abs, 0x6e)
04:40:25 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
read$eventfd(0xffffffffffffffff, &(0x7f0000000240), 0x8)
04:40:25 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000000c0)=@abs, 0x6e)
04:40:25 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]})
openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0)
ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000140))
04:40:25 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
socket$inet_udp(0x2, 0x2, 0x0)
04:40:25 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50350}]})
ioperm(0x0, 0x0, 0x0)
04:40:26 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0)
[ 572.041471] audit: type=1326 audit(1529728826.040:847): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3410 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:26 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0)
04:40:26 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000000c0)=@abs, 0x6e)
04:40:26 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]})
openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0)
ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000140))
04:40:26 executing program 0:
pipe(&(0x7f0000000000))
ioperm(0x0, 0x0, 0x0)
04:40:26 executing program 1:
prctl$setptracer(0x59616d61, 0x0)
socket$inet_udp(0x2, 0x2, 0x0)
04:40:26 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0)
04:40:26 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d5}]})
creat(&(0x7f0000000080)='./file0\x00', 0x0)
sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0)
04:40:26 executing program 0:
pipe(&(0x7f0000000000))
ioperm(0x0, 0x0, 0x0)
04:40:26 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]})
openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0)
ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000140))
04:40:26 executing program 1:
prctl$setptracer(0x59616d61, 0x0)
socket$inet_udp(0x2, 0x2, 0x0)
04:40:26 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0)
04:40:26 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d5}]})
creat(&(0x7f0000000080)='./file0\x00', 0x0)
sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0)
04:40:26 executing program 1:
prctl$setptracer(0x59616d61, 0x0)
socket$inet_udp(0x2, 0x2, 0x0)
04:40:26 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000000c0)=@abs, 0x6e)
04:40:26 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
read$eventfd(0xffffffffffffffff, &(0x7f0000000240), 0x8)
04:40:26 executing program 0:
pipe(&(0x7f0000000000))
ioperm(0x0, 0x0, 0x0)
04:40:27 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
prctl$setptracer(0x59616d61, 0x0)
socket$inet_udp(0x2, 0x2, 0x0)
04:40:27 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000000c0)=@abs, 0x6e)
04:40:27 executing program 0:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50350}]})
pipe(&(0x7f0000000000))
ioperm(0x0, 0x0, 0x0)
04:40:27 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d5}]})
creat(&(0x7f0000000080)='./file0\x00', 0x0)
sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0)
04:40:27 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0)
04:40:27 executing program 0:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50350}]})
pipe(&(0x7f0000000000))
ioperm(0x0, 0x0, 0x0)
04:40:27 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
prctl$setptracer(0x59616d61, 0x0)
socket$inet_udp(0x2, 0x2, 0x0)
04:40:27 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
arch_prctl(0x0, &(0x7f0000000580))
setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000), 0x4)
04:40:27 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]})
openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0)
ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000140))
04:40:27 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d5}]})
creat(&(0x7f0000000080)='./file0\x00', 0x0)
sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0)
04:40:27 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0)
04:40:27 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5009f}]})
mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x0, 0xffffffffffffffff, 0x0)
read$eventfd(0xffffffffffffffff, &(0x7f0000000240), 0x8)
04:40:27 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
prctl$setptracer(0x59616d61, 0x0)
socket$inet_udp(0x2, 0x2, 0x0)
04:40:27 executing program 0:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50350}]})
pipe(&(0x7f0000000000))
ioperm(0x0, 0x0, 0x0)
04:40:27 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
arch_prctl(0x0, &(0x7f0000000580))
setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000), 0x4)
04:40:27 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d5}]})
sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0)
04:40:27 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0)
04:40:28 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000000c0)=@abs, 0x6e)
04:40:28 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
prctl$setptracer(0x59616d61, 0x0)
socket$inet_udp(0x2, 0x2, 0x0)
04:40:28 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000080)})
pipe(&(0x7f0000000000))
ioperm(0x0, 0x0, 0x0)
04:40:28 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0)
ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000100))
04:40:28 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0)
04:40:28 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d5}]})
sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0)
04:40:28 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
arch_prctl(0x0, &(0x7f0000000580))
setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000), 0x4)
04:40:28 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]})
openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0)
ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000140))
04:40:28 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000080)})
pipe(&(0x7f0000000000))
ioperm(0x0, 0x0, 0x0)
04:40:28 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
prctl$setptracer(0x59616d61, 0x0)
socket$inet_udp(0x2, 0x2, 0x0)
04:40:28 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d5}]})
sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0)
04:40:28 executing program 5:
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0)
04:40:28 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
arch_prctl(0x0, &(0x7f0000000580))
setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000), 0x4)
04:40:28 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0)
ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000100))
04:40:28 executing program 5:
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0)
04:40:28 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000080)})
pipe(&(0x7f0000000000))
ioperm(0x0, 0x0, 0x0)
[ 574.510357] kauditd_printk_skb: 6 callbacks suppressed
[ 574.510380] audit: type=1326 audit(1529728828.508:854): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3569 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:29 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000000c0)=@abs, 0x6e)
04:40:29 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
prctl$setptracer(0x59616d61, 0x0)
socket$inet_udp(0x2, 0x2, 0x0)
04:40:29 executing program 4:
creat(&(0x7f0000000080)='./file0\x00', 0x0)
sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0)
04:40:29 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000), 0x4)
04:40:29 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0)
ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000100))
04:40:29 executing program 5:
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0)
04:40:29 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x50350}]})
pipe(&(0x7f0000000000))
ioperm(0x0, 0x0, 0x0)
[ 575.071462] audit: type=1326 audit(1529728829.069:855): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3592 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:29 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0)
ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000100))
04:40:29 executing program 5:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0)
04:40:29 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000), 0x4)
04:40:29 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x50350}]})
pipe(&(0x7f0000000000))
ioperm(0x0, 0x0, 0x0)
04:40:29 executing program 4:
creat(&(0x7f0000000080)='./file0\x00', 0x0)
sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0)
04:40:29 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
prctl$setptracer(0x59616d61, 0x0)
socket$inet_udp(0x2, 0x2, 0x0)
04:40:29 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0)
ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000080))
04:40:29 executing program 4:
creat(&(0x7f0000000080)='./file0\x00', 0x0)
sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0)
04:40:29 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x50350}]})
pipe(&(0x7f0000000000))
ioperm(0x0, 0x0, 0x0)
04:40:29 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
prctl$setptracer(0x59616d61, 0x0)
socket$inet_udp(0x2, 0x2, 0x0)
04:40:29 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000100))
04:40:29 executing program 5:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0)
04:40:29 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0)
ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000080))
04:40:29 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000), 0x4)
04:40:29 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
request_key(&(0x7f0000000180)='.dead\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000200)='/dev/uinput\x00', 0x0)
sched_getscheduler(0x0)
04:40:29 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]})
pipe(&(0x7f0000000000))
ioperm(0x0, 0x0, 0x0)
04:40:29 executing program 4:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d5}]})
creat(&(0x7f0000000080)='./file0\x00', 0x0)
sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0)
[ 576.018791] audit: type=1326 audit(1529728830.017:856): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3641 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:30 executing program 5:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0)
04:40:30 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
prctl$setptracer(0x59616d61, 0x0)
socket$inet_udp(0x2, 0x2, 0x0)
04:40:30 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000100))
04:40:30 executing program 6:
arch_prctl(0x0, &(0x7f0000000580))
setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000), 0x4)
04:40:30 executing program 4:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d5}]})
creat(&(0x7f0000000080)='./file0\x00', 0x0)
sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0)
04:40:30 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0)
ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000080))
04:40:30 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
request_key(&(0x7f0000000180)='.dead\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000200)='/dev/uinput\x00', 0x0)
sched_getscheduler(0x0)
04:40:30 executing program 4:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d5}]})
creat(&(0x7f0000000080)='./file0\x00', 0x0)
sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0)
04:40:30 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0)
04:40:30 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
prctl$setptracer(0x59616d61, 0x0)
socket$inet_udp(0x2, 0x2, 0x0)
04:40:30 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000100))
04:40:30 executing program 6:
arch_prctl(0x0, &(0x7f0000000580))
setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000), 0x4)
04:40:30 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0)
ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000080))
[ 576.492761] audit: type=1326 audit(1529728830.491:857): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3680 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:30 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
request_key(&(0x7f0000000180)='.dead\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000200)='/dev/uinput\x00', 0x0)
sched_getscheduler(0x0)
04:40:30 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]})
pipe(&(0x7f0000000000))
ioperm(0x0, 0x0, 0x0)
04:40:30 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)})
creat(&(0x7f0000000080)='./file0\x00', 0x0)
sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0)
04:40:30 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0)
04:40:30 executing program 2:
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0)
ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000100))
04:40:30 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000080))
04:40:30 executing program 6:
arch_prctl(0x0, &(0x7f0000000580))
setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000), 0x4)
04:40:30 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
request_key(&(0x7f0000000180)='.dead\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000200)='/dev/uinput\x00', 0x0)
sched_getscheduler(0x0)
[ 576.981586] audit: type=1326 audit(1529728830.980:858): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3716 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:31 executing program 2:
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0)
ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000100))
04:40:31 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0)
04:40:31 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)})
creat(&(0x7f0000000080)='./file0\x00', 0x0)
sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0)
04:40:31 executing program 6:
seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
arch_prctl(0x0, &(0x7f0000000580))
setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000), 0x4)
04:40:31 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
prctl$setptracer(0x59616d61, 0x0)
socket$inet_udp(0x2, 0x2, 0x0)
04:40:31 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000080))
04:40:31 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
sched_getscheduler(0x0)
04:40:31 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)})
creat(&(0x7f0000000080)='./file0\x00', 0x0)
sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0)
04:40:31 executing program 6:
seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
arch_prctl(0x0, &(0x7f0000000580))
setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000), 0x4)
[ 577.411522] audit: type=1326 audit(1529728831.410:859): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3746 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:31 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]})
pipe(&(0x7f0000000000))
ioperm(0x0, 0x0, 0x0)
04:40:31 executing program 2:
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0)
ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000100))
04:40:31 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0)
04:40:31 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501d5}]})
creat(&(0x7f0000000080)='./file0\x00', 0x0)
sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0)
04:40:31 executing program 6:
seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
arch_prctl(0x0, &(0x7f0000000580))
setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000), 0x4)
04:40:31 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
sched_getscheduler(0x0)
04:40:31 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000080))
04:40:32 executing program 2:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0)
ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000100))
[ 577.966832] audit: type=1326 audit(1529728831.965:860): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3766 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:32 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)})
arch_prctl(0x0, &(0x7f0000000580))
setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000), 0x4)
04:40:32 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501d5}]})
creat(&(0x7f0000000080)='./file0\x00', 0x0)
sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0)
04:40:32 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0)
04:40:32 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
prctl$setptracer(0x59616d61, 0x0)
socket$inet_udp(0x2, 0x2, 0x0)
04:40:32 executing program 7:
openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0)
ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000080))
04:40:32 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
sched_getscheduler(0x0)
04:40:32 executing program 2:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0)
ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000100))
04:40:32 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501d5}]})
creat(&(0x7f0000000080)='./file0\x00', 0x0)
sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0)
[ 578.384290] audit: type=1326 audit(1529728832.382:861): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3796 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:32 executing program 7:
openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0)
ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000080))
04:40:32 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0)
04:40:32 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)})
arch_prctl(0x0, &(0x7f0000000580))
setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000), 0x4)
04:40:32 executing program 2:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0)
ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000100))
04:40:32 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]})
creat(&(0x7f0000000080)='./file0\x00', 0x0)
sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0)
04:40:32 executing program 3:
request_key(&(0x7f0000000180)='.dead\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000200)='/dev/uinput\x00', 0x0)
sched_getscheduler(0x0)
04:40:32 executing program 0:
r0 = socket$packet(0x11, 0x2, 0x300)
sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000240)=@nfc={0x27, 0x1}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000040)="26fb583d066ae6a2abd2e068d40b1a218fcf45b1dd9b5ac63dffa4349f46e4e10174ca5f99936b59ff00a7e0dcaa7c7e833eeca3cac47004418e360ecd98844b09", 0x41}], 0x1, &(0x7f0000000000)}}], 0x1, 0x0)
[ 578.907801] audit: type=1326 audit(1529728832.906:862): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3803 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:33 executing program 7:
openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0)
ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000080))
04:40:33 executing program 3:
request_key(&(0x7f0000000180)='.dead\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000200)='/dev/uinput\x00', 0x0)
sched_getscheduler(0x0)
04:40:33 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0)
04:40:33 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)})
arch_prctl(0x0, &(0x7f0000000580))
setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000), 0x4)
[ 579.088572] audit: type=1326 audit(1529728833.087:863): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3824 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:33 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]})
arch_prctl(0x0, &(0x7f0000000580))
setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000), 0x4)
04:40:33 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)})
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0)
ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000100))
04:40:33 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
creat(&(0x7f0000000080)='./file0\x00', 0x0)
getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x54)
04:40:33 executing program 3:
request_key(&(0x7f0000000180)='.dead\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000200)='/dev/uinput\x00', 0x0)
sched_getscheduler(0x0)
04:40:33 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]})
ustat(0x0, &(0x7f0000000000))
mq_timedreceive(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0, &(0x7f0000000140))
04:40:33 executing program 7:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0)
ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000080))
04:40:33 executing program 3:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
request_key(&(0x7f0000000180)='.dead\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000200)='/dev/uinput\x00', 0x0)
sched_getscheduler(0x0)
04:40:33 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)})
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0)
ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000100))
04:40:33 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]})
arch_prctl(0x0, &(0x7f0000000580))
setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000), 0x4)
04:40:33 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]})
creat(&(0x7f0000000080)='./file0\x00', 0x0)
sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0)
04:40:33 executing program 7:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0)
ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000080))
04:40:33 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
creat(&(0x7f0000000080)='./file0\x00', 0x0)
getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x54)
04:40:33 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]})
ustat(0x0, &(0x7f0000000000))
mq_timedreceive(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0, &(0x7f0000000140))
04:40:33 executing program 3:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
request_key(&(0x7f0000000180)='.dead\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000200)='/dev/uinput\x00', 0x0)
sched_getscheduler(0x0)
[ 579.857210] audit: type=1326 audit(1529728833.855:864): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3871 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:34 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0)
04:40:34 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]})
arch_prctl(0x0, &(0x7f0000000580))
setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000), 0x4)
04:40:34 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)})
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0)
ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000100))
04:40:34 executing program 7:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0)
ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000080))
04:40:34 executing program 3:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
request_key(&(0x7f0000000180)='.dead\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000200)='/dev/uinput\x00', 0x0)
sched_getscheduler(0x0)
04:40:34 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]})
ustat(0x0, &(0x7f0000000000))
mq_timedreceive(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0, &(0x7f0000000140))
04:40:34 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
creat(&(0x7f0000000080)='./file0\x00', 0x0)
getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x54)
04:40:34 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]})
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0)
ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000100))
[ 580.075893] audit: type=1326 audit(1529728834.068:865): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3892 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:34 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]})
arch_prctl(0x0, &(0x7f0000000580))
setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000), 0x4)
04:40:34 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
request_key(&(0x7f0000000180)='.dead\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000200)='/dev/uinput\x00', 0x0)
sched_getscheduler(0x0)
04:40:34 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0)
ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000080))
[ 580.209406] audit: type=1326 audit(1529728834.208:866): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3900 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:34 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]})
creat(&(0x7f0000000080)='./file0\x00', 0x0)
sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0)
04:40:34 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]})
ustat(0x0, &(0x7f0000000000))
mq_timedreceive(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0, &(0x7f0000000140))
04:40:34 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
creat(&(0x7f0000000080)='./file0\x00', 0x0)
getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x54)
04:40:34 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0)
ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000080))
04:40:34 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]})
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0)
ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000100))
[ 580.822119] audit: type=1326 audit(1529728834.820:867): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3923 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:34 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0)
04:40:34 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
request_key(&(0x7f0000000180)='.dead\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000200)='/dev/uinput\x00', 0x0)
sched_getscheduler(0x0)
04:40:34 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0)
ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000080))
04:40:34 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]})
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0)
ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000100))
04:40:34 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x54)
04:40:34 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]})
mq_timedreceive(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0, &(0x7f0000000140))
[ 581.037430] audit: type=1326 audit(1529728835.036:868): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3939 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:35 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0)
ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000080))
04:40:35 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
request_key(&(0x7f0000000180)='.dead\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000200)='/dev/uinput\x00', 0x0)
sched_getscheduler(0x0)
04:40:35 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]})
mq_timedreceive(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0, &(0x7f0000000140))
04:40:35 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]})
arch_prctl(0x0, &(0x7f0000000580))
setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000), 0x4)
04:40:35 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x54)
[ 581.259766] audit: type=1326 audit(1529728835.258:869): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3958 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:35 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
request_key(&(0x7f0000000180)='.dead\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000200)='/dev/uinput\x00', 0x0)
sched_getscheduler(0x0)
04:40:35 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]})
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0)
ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000100))
04:40:35 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0)
ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000080))
04:40:35 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]})
mq_timedreceive(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0, &(0x7f0000000140))
04:40:35 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x54)
[ 581.774469] audit: type=1326 audit(1529728835.773:870): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3966 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:35 executing program 1:
ustat(0x0, &(0x7f0000000000))
mq_timedreceive(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0, &(0x7f0000000140))
04:40:35 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)={'broute\x00'}, &(0x7f0000000100)=0x78)
04:40:35 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
request_key(&(0x7f0000000180)='.dead\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000200)='/dev/uinput\x00', 0x0)
sched_getscheduler(0x0)
04:40:35 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0)
ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000080))
04:40:35 executing program 0:
creat(&(0x7f0000000080)='./file0\x00', 0x0)
getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x54)
04:40:35 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0)
ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000200)={'rose0\x00'})
04:40:36 executing program 0:
creat(&(0x7f0000000080)='./file0\x00', 0x0)
getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x54)
04:40:36 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
request_key(&(0x7f0000000180)='.dead\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000200)='/dev/uinput\x00', 0x0)
sched_getscheduler(0x0)
04:40:36 executing program 1:
ustat(0x0, &(0x7f0000000000))
mq_timedreceive(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0, &(0x7f0000000140))
04:40:36 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]})
arch_prctl(0x0, &(0x7f0000000580))
setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000), 0x4)
04:40:36 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0)
ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000080))
04:40:36 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)={'broute\x00'}, &(0x7f0000000100)=0x78)
[ 582.274324] audit: type=1326 audit(1529728836.272:871): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4010 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
[ 582.350356] audit: type=1326 audit(1529728836.337:872): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4017 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:36 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]})
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0)
ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000100))
04:40:36 executing program 0:
creat(&(0x7f0000000080)='./file0\x00', 0x0)
getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x54)
04:40:36 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0)
ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000200)={'rose0\x00'})
04:40:36 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
request_key(&(0x7f0000000180)='.dead\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000200)='/dev/uinput\x00', 0x0)
sched_getscheduler(0x0)
04:40:36 executing program 1:
ustat(0x0, &(0x7f0000000000))
mq_timedreceive(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0, &(0x7f0000000140))
04:40:36 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)={'broute\x00'}, &(0x7f0000000100)=0x78)
[ 582.701631] audit: type=1326 audit(1529728836.700:873): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4026 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:36 executing program 0:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
creat(&(0x7f0000000080)='./file0\x00', 0x0)
getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x54)
04:40:36 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]})
ustat(0x0, &(0x7f0000000000))
mq_timedreceive(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0, &(0x7f0000000140))
04:40:36 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)={'broute\x00'}, &(0x7f0000000100)=0x78)
04:40:36 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0)
ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000200)={'rose0\x00'})
04:40:36 executing program 0:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
creat(&(0x7f0000000080)='./file0\x00', 0x0)
getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x54)
04:40:36 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]})
ustat(0x0, &(0x7f0000000000))
mq_timedreceive(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0, &(0x7f0000000140))
04:40:37 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)={'broute\x00'}, &(0x7f0000000100)=0x78)
04:40:37 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0)
ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000080))
04:40:37 executing program 0:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
creat(&(0x7f0000000080)='./file0\x00', 0x0)
getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x54)
04:40:37 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]})
ustat(0x0, &(0x7f0000000000))
mq_timedreceive(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0, &(0x7f0000000140))
04:40:37 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]})
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0)
ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000100))
04:40:37 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0)
ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000200)={'rose0\x00'})
04:40:37 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)={'broute\x00'}, &(0x7f0000000100)=0x78)
04:40:37 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0)
write$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8)
04:40:37 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000300)})
ustat(0x0, &(0x7f0000000000))
mq_timedreceive(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0, &(0x7f0000000140))
04:40:37 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
creat(&(0x7f0000000080)='./file0\x00', 0x0)
getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x54)
04:40:37 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
request_key(&(0x7f0000000180)='.dead\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000200)='/dev/uinput\x00', 0x0)
sched_getscheduler(0x0)
04:40:37 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
creat(&(0x7f0000000080)='./file0\x00', 0x0)
getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x54)
04:40:37 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000300)})
ustat(0x0, &(0x7f0000000000))
mq_timedreceive(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0, &(0x7f0000000140))
04:40:37 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000200)={'rose0\x00'})
04:40:37 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)={'broute\x00'}, &(0x7f0000000100)=0x78)
04:40:37 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0)
write$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8)
04:40:37 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
creat(&(0x7f0000000080)='./file0\x00', 0x0)
getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x54)
04:40:38 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0)
ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000080))
04:40:38 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000300)})
ustat(0x0, &(0x7f0000000000))
mq_timedreceive(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0, &(0x7f0000000140))
04:40:38 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000200)={'rose0\x00'})
04:40:38 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
request_key(&(0x7f0000000180)='.dead\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000200)='/dev/uinput\x00', 0x0)
sched_getscheduler(0x0)
04:40:38 executing program 4:
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)={'broute\x00'}, &(0x7f0000000100)=0x78)
04:40:38 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
creat(&(0x7f0000000080)='./file0\x00', 0x0)
getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x54)
04:40:38 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0)
write$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8)
04:40:38 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]})
openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0)
msgget(0xffffffffffffffff, 0x0)
04:40:38 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x50355}]})
ustat(0x0, &(0x7f0000000000))
mq_timedreceive(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0, &(0x7f0000000140))
04:40:38 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000200)={'rose0\x00'})
04:40:38 executing program 4:
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)={'broute\x00'}, &(0x7f0000000100)=0x78)
04:40:38 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x50355}]})
ustat(0x0, &(0x7f0000000000))
mq_timedreceive(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0, &(0x7f0000000140))
04:40:38 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
creat(&(0x7f0000000080)='./file0\x00', 0x0)
getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x54)
04:40:38 executing program 5:
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0)
ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000200)={'rose0\x00'})
04:40:38 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0)
write$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8)
04:40:38 executing program 2:
04:40:39 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
write$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8)
04:40:39 executing program 4:
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)={'broute\x00'}, &(0x7f0000000100)=0x78)
04:40:39 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
creat(&(0x7f0000000080)='./file0\x00', 0x0)
getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x54)
04:40:39 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
write$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8)
04:40:39 executing program 5:
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0)
ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000200)={'rose0\x00'})
04:40:39 executing program 2:
04:40:39 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x50355}]})
ustat(0x0, &(0x7f0000000000))
mq_timedreceive(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0, &(0x7f0000000140))
04:40:39 executing program 7:
04:40:39 executing program 4:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)={'broute\x00'}, &(0x7f0000000100)=0x78)
04:40:39 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
creat(&(0x7f0000000080)='./file0\x00', 0x0)
getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x54)
04:40:39 executing program 3:
[ 585.677381] kauditd_printk_skb: 6 callbacks suppressed
[ 585.677406] audit: type=1326 audit(1529728839.669:880): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4178 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:39 executing program 2:
04:40:39 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
accept$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x6e)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa}, 0x1c)
04:40:39 executing program 4:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)={'broute\x00'}, &(0x7f0000000100)=0x78)
04:40:39 executing program 5:
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0)
ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000200)={'rose0\x00'})
04:40:39 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6}]})
ustat(0x0, &(0x7f0000000000))
mq_timedreceive(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0, &(0x7f0000000140))
04:40:39 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0)
getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000400)={'filter\x00'}, &(0x7f0000000540)=0x24)
04:40:39 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000040))
bind$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x14)
04:40:39 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
write$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8)
[ 585.898961] audit: type=1326 audit(1529728839.897:881): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4202 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:40 executing program 4:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)={'broute\x00'}, &(0x7f0000000100)=0x78)
04:40:40 executing program 5:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0)
ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000200)={'rose0\x00'})
04:40:40 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
accept$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x6e)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa}, 0x1c)
04:40:40 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0)
getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000400)={'filter\x00'}, &(0x7f0000000540)=0x24)
04:40:40 executing program 6:
openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0)
write$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8)
04:40:40 executing program 2:
04:40:40 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
creat(&(0x7f0000000080)='./file0\x00', 0x0)
getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x54)
04:40:40 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)={'broute\x00'}, &(0x7f0000000100)=0x78)
04:40:40 executing program 5:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0)
ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000200)={'rose0\x00'})
04:40:40 executing program 2:
04:40:40 executing program 6:
openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0)
write$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8)
04:40:40 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
accept$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x6e)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa}, 0x1c)
[ 586.618441] audit: type=1326 audit(1529728840.617:882): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4250 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:40 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6}]})
ustat(0x0, &(0x7f0000000000))
mq_timedreceive(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0, &(0x7f0000000140))
04:40:40 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0)
getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000400)={'filter\x00'}, &(0x7f0000000540)=0x24)
04:40:40 executing program 2:
04:40:40 executing program 6:
openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0)
write$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8)
04:40:40 executing program 5:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0)
ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000200)={'rose0\x00'})
04:40:40 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)={'broute\x00'}, &(0x7f0000000100)=0x78)
04:40:40 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
accept$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x6e)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa}, 0x1c)
04:40:40 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)={'broute\x00'}, &(0x7f0000000100)=0x78)
[ 586.867497] audit: type=1326 audit(1529728840.866:883): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4271 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:40 executing program 2:
04:40:40 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)})
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0)
ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000200)={'rose0\x00'})
04:40:41 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
creat(&(0x7f0000000080)='./file0\x00', 0x0)
getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x54)
04:40:41 executing program 6:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0)
write$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8)
04:40:41 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0)
getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000400)={'filter\x00'}, &(0x7f0000000540)=0x24)
04:40:41 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa}, 0x1c)
04:40:41 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)})
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0)
ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000200)={'rose0\x00'})
04:40:41 executing program 2:
[ 587.588657] audit: type=1326 audit(1529728841.587:884): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4297 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:41 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6}]})
ustat(0x0, &(0x7f0000000000))
mq_timedreceive(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0, &(0x7f0000000140))
04:40:41 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)={'broute\x00'}, &(0x7f0000000100)=0x78)
04:40:41 executing program 2:
04:40:41 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa}, 0x1c)
04:40:41 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)})
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0)
ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000200)={'rose0\x00'})
04:40:41 executing program 6:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0)
write$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8)
04:40:41 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000400)={'filter\x00'}, &(0x7f0000000540)=0x24)
04:40:41 executing program 2:
[ 587.844198] audit: type=1326 audit(1529728841.842:885): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4317 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:41 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]})
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0)
ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000200)={'rose0\x00'})
04:40:41 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)={'broute\x00'}, &(0x7f0000000100)=0x78)
04:40:42 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000400)={'filter\x00'}, &(0x7f0000000540)=0x24)
04:40:42 executing program 6:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0)
write$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8)
04:40:42 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa}, 0x1c)
04:40:42 executing program 2:
04:40:42 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)={'broute\x00'}, &(0x7f0000000100)=0x78)
04:40:42 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]})
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0)
ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000200)={'rose0\x00'})
04:40:42 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000400)={'filter\x00'}, &(0x7f0000000540)=0x24)
04:40:42 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0)
write$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8)
04:40:42 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]})
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0)
ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000200)={'rose0\x00'})
04:40:42 executing program 0:
04:40:42 executing program 2:
04:40:42 executing program 7:
accept$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x6e)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa}, 0x1c)
04:40:42 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)={'broute\x00'}, &(0x7f0000000100)=0x78)
04:40:42 executing program 1:
[ 588.782952] audit: type=1326 audit(1529728842.781:886): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4363 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:42 executing program 2:
04:40:42 executing program 0:
04:40:42 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0)
write$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8)
04:40:42 executing program 7:
accept$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x6e)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa}, 0x1c)
04:40:42 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]})
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0)
ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000200)={'rose0\x00'})
04:40:42 executing program 1:
04:40:43 executing program 3:
openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0)
getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000400)={'filter\x00'}, &(0x7f0000000540)=0x24)
[ 589.008322] audit: type=1326 audit(1529728843.006:887): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4385 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:43 executing program 2:
04:40:43 executing program 0:
04:40:43 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0)
write$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8)
04:40:43 executing program 1:
04:40:43 executing program 7:
accept$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x6e)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa}, 0x1c)
04:40:43 executing program 3:
openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0)
getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000400)={'filter\x00'}, &(0x7f0000000540)=0x24)
04:40:43 executing program 2:
04:40:43 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0)
write$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8)
04:40:43 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)={'broute\x00'}, &(0x7f0000000100)=0x78)
04:40:43 executing program 0:
04:40:43 executing program 7:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
accept$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x6e)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa}, 0x1c)
04:40:43 executing program 1:
04:40:43 executing program 2:
[ 589.701429] audit: type=1326 audit(1529728843.700:888): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4418 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:43 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]})
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0)
ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000200)={'rose0\x00'})
04:40:43 executing program 3:
openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0)
getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000400)={'filter\x00'}, &(0x7f0000000540)=0x24)
04:40:43 executing program 2:
04:40:43 executing program 7:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
accept$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x6e)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa}, 0x1c)
04:40:43 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0)
write$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8)
04:40:43 executing program 0:
04:40:43 executing program 1:
[ 589.973496] audit: type=1326 audit(1529728843.972:889): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4436 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:44 executing program 2:
04:40:44 executing program 1:
04:40:44 executing program 0:
04:40:44 executing program 7:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
accept$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x6e)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa}, 0x1c)
04:40:44 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)={'broute\x00'}, &(0x7f0000000100)=0x78)
04:40:44 executing program 3:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0)
getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000400)={'filter\x00'}, &(0x7f0000000540)=0x24)
04:40:44 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0)
write$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8)
04:40:44 executing program 2:
04:40:44 executing program 0:
04:40:44 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]})
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0)
ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000200)={'rose0\x00'})
04:40:44 executing program 1:
04:40:44 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)})
accept$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x6e)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa}, 0x1c)
04:40:44 executing program 0:
04:40:44 executing program 2:
04:40:44 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0)
write$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8)
04:40:44 executing program 3:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0)
getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000400)={'filter\x00'}, &(0x7f0000000540)=0x24)
[ 590.891233] kauditd_printk_skb: 1 callbacks suppressed
[ 590.891256] audit: type=1326 audit(1529728844.887:891): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4509 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:44 executing program 0:
04:40:44 executing program 2:
04:40:45 executing program 1:
04:40:45 executing program 3:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0)
getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000400)={'filter\x00'}, &(0x7f0000000540)=0x24)
[ 590.976546] audit: type=1326 audit(1529728844.945:892): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4517 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:45 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0)
getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000400)={'filter\x00'}, &(0x7f0000000540)=0x24)
04:40:45 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)})
accept$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x6e)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa}, 0x1c)
04:40:45 executing program 0:
04:40:45 executing program 1:
04:40:45 executing program 2:
04:40:45 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0)
write$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8)
04:40:45 executing program 4:
04:40:45 executing program 1:
04:40:45 executing program 2:
04:40:45 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)})
accept$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x6e)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa}, 0x1c)
04:40:45 executing program 0:
04:40:45 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0)
getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000400)={'filter\x00'}, &(0x7f0000000540)=0x24)
04:40:45 executing program 5:
[ 591.888395] audit: type=1326 audit(1529728845.886:893): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4551 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:45 executing program 2:
04:40:45 executing program 4:
04:40:45 executing program 1:
04:40:45 executing program 0:
04:40:46 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0)
getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000400)={'filter\x00'}, &(0x7f0000000540)=0x24)
04:40:46 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]})
accept$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x6e)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa}, 0x1c)
04:40:46 executing program 5:
04:40:46 executing program 4:
04:40:46 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0)
write$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8)
04:40:46 executing program 2:
04:40:46 executing program 1:
04:40:46 executing program 0:
04:40:46 executing program 5:
04:40:46 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0)
getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000400)={'filter\x00'}, &(0x7f0000000540)=0x24)
04:40:46 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]})
accept$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x6e)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa}, 0x1c)
04:40:46 executing program 4:
[ 592.801609] audit: type=1326 audit(1529728846.800:894): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4590 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:46 executing program 5:
04:40:46 executing program 4:
04:40:46 executing program 0:
04:40:46 executing program 2:
04:40:46 executing program 1:
04:40:46 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]})
accept$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x6e)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa}, 0x1c)
04:40:47 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0)
getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000400)={'filter\x00'}, &(0x7f0000000540)=0x24)
04:40:47 executing program 5:
04:40:47 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0)
getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000400)={'filter\x00'}, &(0x7f0000000540)=0x24)
04:40:47 executing program 4:
04:40:47 executing program 0:
04:40:47 executing program 1:
04:40:47 executing program 2:
04:40:47 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]})
accept$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x6e)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa}, 0x1c)
04:40:47 executing program 5:
04:40:47 executing program 6:
04:40:47 executing program 4:
[ 593.761129] audit: type=1326 audit(1529728847.759:895): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4629 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:47 executing program 1:
04:40:47 executing program 6:
04:40:47 executing program 5:
04:40:47 executing program 0:
04:40:47 executing program 2:
04:40:47 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0)
getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000400)={'filter\x00'}, &(0x7f0000000540)=0x24)
04:40:48 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0)
04:40:48 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
socket$alg(0x26, 0x5, 0x0)
socket$key(0xf, 0x3, 0x2)
04:40:48 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e2}]})
socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0))
fchmod(0xffffffffffffffff, 0x0)
[ 594.011304] audit: type=1326 audit(1529728848.009:896): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4651 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:48 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000100))
ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f00000000c0)={'team_slave_0\x00'})
04:40:48 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
sched_getaffinity(0x0, 0x8, &(0x7f0000000080))
04:40:48 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040))
04:40:48 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000280), 0x0)
04:40:48 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]})
accept$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x6e)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa}, 0x1c)
04:40:48 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
socket$inet_tcp(0x2, 0x1, 0x0)
modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/134, 0x86)
04:40:48 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040))
04:40:48 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
socket$alg(0x26, 0x5, 0x0)
socket$key(0xf, 0x3, 0x2)
04:40:48 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0)
04:40:48 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e2}]})
socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0))
fchmod(0xffffffffffffffff, 0x0)
[ 594.736690] audit: type=1326 audit(1529728848.735:897): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4703 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:48 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
socket$alg(0x26, 0x5, 0x0)
socket$key(0xf, 0x3, 0x2)
04:40:48 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040))
04:40:48 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0)
getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000400)={'filter\x00'}, &(0x7f0000000540)=0x24)
04:40:48 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e2}]})
socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0))
fchmod(0xffffffffffffffff, 0x0)
04:40:48 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
socket$inet_tcp(0x2, 0x1, 0x0)
modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/134, 0x86)
04:40:48 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0)
04:40:48 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000280), 0x0)
[ 595.038168] audit: type=1326 audit(1529728849.036:898): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4723 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:49 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040))
04:40:49 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
socket$alg(0x26, 0x5, 0x0)
socket$key(0xf, 0x3, 0x2)
04:40:49 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0)
04:40:49 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]})
accept$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x6e)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa}, 0x1c)
04:40:49 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e2}]})
socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0))
fchmod(0xffffffffffffffff, 0x0)
04:40:49 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000280), 0x0)
04:40:49 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
socket$inet_tcp(0x2, 0x1, 0x0)
modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/134, 0x86)
04:40:49 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040))
04:40:49 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
socket$key(0xf, 0x3, 0x2)
04:40:49 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0)
[ 595.721803] audit: type=1326 audit(1529728849.720:899): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4758 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:49 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
socket$key(0xf, 0x3, 0x2)
04:40:49 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0)
getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000400)={'filter\x00'}, &(0x7f0000000540)=0x24)
04:40:49 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000280), 0x0)
04:40:49 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0)
04:40:49 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040))
04:40:49 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e2}]})
fchmod(0xffffffffffffffff, 0x0)
04:40:49 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
socket$inet_tcp(0x2, 0x1, 0x0)
modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/134, 0x86)
04:40:49 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
socket$key(0xf, 0x3, 0x2)
[ 596.033735] audit: type=1326 audit(1529728850.032:900): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4781 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:50 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e2}]})
fchmod(0xffffffffffffffff, 0x0)
04:40:50 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040))
04:40:50 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0)
04:40:50 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000280), 0x0)
04:40:50 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/134, 0x86)
04:40:50 executing program 2:
socket$alg(0x26, 0x5, 0x0)
socket$key(0xf, 0x3, 0x2)
04:40:50 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e2}]})
fchmod(0xffffffffffffffff, 0x0)
04:40:50 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000080))
04:40:50 executing program 2:
socket$alg(0x26, 0x5, 0x0)
socket$key(0xf, 0x3, 0x2)
04:40:50 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
ioprio_get$uid(0x0, 0x0)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040))
04:40:50 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/134, 0x86)
04:40:50 executing program 6:
socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0))
fchmod(0xffffffffffffffff, 0x0)
04:40:50 executing program 4:
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0)
04:40:50 executing program 5:
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040))
04:40:50 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000280), 0x0)
04:40:50 executing program 2:
socket$alg(0x26, 0x5, 0x0)
socket$key(0xf, 0x3, 0x2)
04:40:50 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000180))
04:40:51 executing program 5:
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040))
04:40:51 executing program 2:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
socket$alg(0x26, 0x5, 0x0)
socket$key(0xf, 0x3, 0x2)
04:40:51 executing program 4:
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0)
04:40:51 executing program 6:
socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0))
fchmod(0xffffffffffffffff, 0x0)
04:40:51 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/134, 0x86)
04:40:51 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000280), 0x0)
04:40:51 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000180))
04:40:51 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
ioprio_get$uid(0x0, 0x0)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040))
04:40:51 executing program 4:
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0)
04:40:51 executing program 2:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
socket$alg(0x26, 0x5, 0x0)
socket$key(0xf, 0x3, 0x2)
04:40:51 executing program 5:
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040))
04:40:51 executing program 6:
socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0))
fchmod(0xffffffffffffffff, 0x0)
04:40:51 executing program 0:
socket$inet_tcp(0x2, 0x1, 0x0)
modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/134, 0x86)
04:40:51 executing program 1:
socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000280), 0x0)
04:40:51 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
ioprio_get$uid(0x0, 0x0)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040))
04:40:51 executing program 4:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0)
04:40:51 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000180))
04:40:51 executing program 2:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
socket$alg(0x26, 0x5, 0x0)
socket$key(0xf, 0x3, 0x2)
04:40:51 executing program 5:
seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040))
04:40:51 executing program 6:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e2}]})
socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0))
fchmod(0xffffffffffffffff, 0x0)
04:40:51 executing program 0:
socket$inet_tcp(0x2, 0x1, 0x0)
modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/134, 0x86)
04:40:51 executing program 1:
socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000280), 0x0)
04:40:51 executing program 4:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0)
04:40:51 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
socket$alg(0x26, 0x5, 0x0)
socket$key(0xf, 0x3, 0x2)
04:40:51 executing program 5:
seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040))
04:40:51 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
ioprio_get$uid(0x0, 0x0)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040))
04:40:51 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000180))
04:40:51 executing program 6:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e2}]})
socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0))
fchmod(0xffffffffffffffff, 0x0)
04:40:51 executing program 0:
socket$inet_tcp(0x2, 0x1, 0x0)
modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/134, 0x86)
04:40:52 executing program 1:
socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000280), 0x0)
04:40:52 executing program 4:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0)
04:40:52 executing program 5:
seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040))
04:40:52 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
socket$alg(0x26, 0x5, 0x0)
socket$key(0xf, 0x3, 0x2)
04:40:52 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000280), 0x0)
04:40:52 executing program 6:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e2}]})
socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0))
fchmod(0xffffffffffffffff, 0x0)
04:40:52 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000180))
04:40:52 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040))
04:40:52 executing program 0:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
socket$inet_tcp(0x2, 0x1, 0x0)
modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/134, 0x86)
04:40:52 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0)
04:40:52 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040))
04:40:52 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
socket$alg(0x26, 0x5, 0x0)
socket$key(0xf, 0x3, 0x2)
04:40:52 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040))
04:40:52 executing program 0:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
socket$inet_tcp(0x2, 0x1, 0x0)
modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/134, 0x86)
04:40:52 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)})
socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0))
fchmod(0xffffffffffffffff, 0x0)
04:40:52 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000280), 0x0)
04:40:52 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000180))
04:40:52 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040))
04:40:52 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0)
04:40:52 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
socket$alg(0x26, 0x5, 0x0)
socket$key(0xf, 0x3, 0x2)
04:40:52 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000280), 0x0)
04:40:52 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)})
socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0))
fchmod(0xffffffffffffffff, 0x0)
04:40:52 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040))
04:40:52 executing program 0:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
socket$inet_tcp(0x2, 0x1, 0x0)
modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/134, 0x86)
04:40:52 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000180))
04:40:52 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0)
04:40:52 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
socket$alg(0x26, 0x5, 0x0)
socket$key(0xf, 0x3, 0x2)
04:40:52 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040))
04:40:52 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000280), 0x0)
04:40:52 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)})
socket$inet_tcp(0x2, 0x1, 0x0)
modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/134, 0x86)
04:40:52 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040))
04:40:52 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)})
socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0))
fchmod(0xffffffffffffffff, 0x0)
04:40:53 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0)
04:40:53 executing program 3:
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000180))
04:40:53 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
socket$alg(0x26, 0x5, 0x0)
socket$key(0xf, 0x3, 0x2)
04:40:53 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000280), 0x0)
04:40:53 executing program 7:
ioprio_get$uid(0x0, 0x0)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040))
04:40:53 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)})
socket$inet_tcp(0x2, 0x1, 0x0)
modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/134, 0x86)
04:40:53 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040))
04:40:53 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e2}]})
socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0))
fchmod(0xffffffffffffffff, 0x0)
04:40:53 executing program 3:
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000180))
04:40:53 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0)
04:40:53 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000280), 0x0)
04:40:53 executing program 7:
ioprio_get$uid(0x0, 0x0)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040))
04:40:53 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
socket$alg(0x26, 0x5, 0x0)
socket$key(0xf, 0x3, 0x2)
04:40:53 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)})
socket$inet_tcp(0x2, 0x1, 0x0)
modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/134, 0x86)
04:40:53 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e2}]})
socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0))
fchmod(0xffffffffffffffff, 0x0)
04:40:53 executing program 3:
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000180))
04:40:53 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040))
[ 599.547216] audit: type=1326 audit(1529728853.545:901): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5060 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:53 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0)
04:40:53 executing program 7:
ioprio_get$uid(0x0, 0x0)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040))
04:40:53 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000280), 0x0)
04:40:53 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]})
socket$inet_tcp(0x2, 0x1, 0x0)
modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/134, 0x86)
04:40:53 executing program 3:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000180))
04:40:53 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e2}]})
socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0))
fchmod(0xffffffffffffffff, 0x0)
04:40:53 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040))
04:40:53 executing program 7:
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
ioprio_get$uid(0x0, 0x0)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040))
04:40:53 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]})
socket$inet_tcp(0x2, 0x1, 0x0)
modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/134, 0x86)
04:40:53 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0)
04:40:53 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000280), 0x0)
[ 599.880453] audit: type=1326 audit(1529728853.878:902): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5092 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
[ 600.005152] audit: type=1326 audit(1529728854.003:903): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5105 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:54 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
socket$alg(0x26, 0x5, 0x0)
socket$key(0xf, 0x3, 0x2)
04:40:54 executing program 3:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000180))
04:40:54 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]})
socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0))
fchmod(0xffffffffffffffff, 0x0)
04:40:54 executing program 7:
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
ioprio_get$uid(0x0, 0x0)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040))
04:40:54 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000280), 0x0)
04:40:54 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]})
socket$inet_tcp(0x2, 0x1, 0x0)
modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/134, 0x86)
[ 600.509394] audit: type=1326 audit(1529728854.505:904): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5115 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:54 executing program 3:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000180))
04:40:54 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]})
socket$inet_tcp(0x2, 0x1, 0x0)
modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/134, 0x86)
04:40:54 executing program 7:
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
ioprio_get$uid(0x0, 0x0)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040))
[ 600.548742] audit: type=1326 audit(1529728854.528:905): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5116 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:54 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000280), 0x0)
[ 600.655019] audit: type=1326 audit(1529728854.653:906): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5127 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:54 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000180))
[ 600.724920] audit: type=1326 audit(1529728854.713:907): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5135 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:54 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040))
04:40:54 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)})
ioprio_get$uid(0x0, 0x0)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040))
04:40:54 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000180))
[ 600.854298] audit: type=1326 audit(1529728854.852:908): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5148 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:54 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0)
04:40:54 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)})
ioprio_get$uid(0x0, 0x0)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040))
[ 600.977928] audit: type=1326 audit(1529728854.976:909): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5157 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:55 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
socket$alg(0x26, 0x5, 0x0)
socket$key(0xf, 0x3, 0x2)
04:40:55 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000180))
04:40:55 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)})
ioprio_get$uid(0x0, 0x0)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040))
04:40:55 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]})
socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0))
fchmod(0xffffffffffffffff, 0x0)
[ 601.459660] audit: type=1326 audit(1529728855.458:910): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5165 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:55 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000180))
04:40:55 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]})
ioprio_get$uid(0x0, 0x0)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040))
[ 601.516448] audit: type=1326 audit(1529728855.486:911): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5170 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:55 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]})
socket$inet_tcp(0x2, 0x1, 0x0)
modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/134, 0x86)
04:40:55 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000280), 0x0)
04:40:55 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000180))
[ 601.682610] audit: type=1326 audit(1529728855.681:912): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5182 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:55 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000180))
04:40:55 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]})
ioprio_get$uid(0x0, 0x0)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040))
[ 601.736103] audit: type=1326 audit(1529728855.732:913): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5189 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:55 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040))
04:40:55 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000180))
04:40:55 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]})
ioprio_get$uid(0x0, 0x0)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040))
[ 601.873395] audit: type=1326 audit(1529728855.871:914): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5199 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:55 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0)
[ 601.917961] audit: type=1326 audit(1529728855.902:915): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5202 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:56 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]})
ioprio_get$uid(0x0, 0x0)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040))
[ 601.993790] audit: type=1326 audit(1529728855.992:916): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5208 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
[ 602.032747] audit: type=1326 audit(1529728856.031:917): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5211 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:56 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]})
socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0))
fchmod(0xffffffffffffffff, 0x0)
04:40:56 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0)
[ 602.417578] audit: type=1326 audit(1529728856.416:918): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5216 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:56 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0)
04:40:56 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]})
socket$inet_tcp(0x2, 0x1, 0x0)
modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/134, 0x86)
04:40:56 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000280), 0x0)
04:40:56 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0)
[ 602.625327] audit: type=1326 audit(1529728856.623:919): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5227 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:40:56 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0)
04:40:56 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
creat(&(0x7f0000000040)='./file0\x00', 0x0)
iopl(0x0)
04:40:56 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000180))
04:40:56 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
dup(0xffffffffffffffff)
accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000080)=0x1c)
04:40:56 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]})
ioprio_get$uid(0x0, 0x0)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040))
04:40:57 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0)
04:40:57 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
creat(&(0x7f0000000040)='./file0\x00', 0x0)
iopl(0x0)
04:40:57 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
dup(0xffffffffffffffff)
accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000080)=0x1c)
04:40:57 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0)
04:40:57 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
creat(&(0x7f0000000040)='./file0\x00', 0x0)
iopl(0x0)
04:40:57 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
dup(0xffffffffffffffff)
accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000080)=0x1c)
04:40:57 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0)
04:40:57 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
socket$inet_udp(0x2, 0x2, 0x0)
getresgid(&(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180))
04:40:57 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
dup(0xffffffffffffffff)
accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000080)=0x1c)
04:40:57 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
socket$inet_udp(0x2, 0x2, 0x0)
getresgid(&(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180))
04:40:57 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
creat(&(0x7f0000000040)='./file0\x00', 0x0)
iopl(0x0)
04:40:57 executing program 2:
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0)
04:40:57 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0)
accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x1c, 0x0)
04:40:57 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000080)=0x1c)
04:40:57 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000180))
04:40:57 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0)
accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x1c, 0x0)
04:40:57 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]})
ioprio_get$uid(0x0, 0x0)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040))
04:40:57 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
iopl(0x0)
04:40:57 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
socket$inet_tcp(0x2, 0x1, 0x0)
sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0)
04:40:57 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
socket$inet_udp(0x2, 0x2, 0x0)
getresgid(&(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180))
04:40:57 executing program 2:
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0)
04:40:57 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000080)=0x1c)
04:40:58 executing program 2:
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0)
04:40:58 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000080)=0x1c)
04:40:58 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
iopl(0x0)
04:40:58 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0)
accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x1c, 0x0)
04:40:58 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
socket$inet_udp(0x2, 0x2, 0x0)
getresgid(&(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180))
04:40:58 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
socket$inet_tcp(0x2, 0x1, 0x0)
sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0)
04:40:58 executing program 2:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0)
04:40:58 executing program 4:
dup(0xffffffffffffffff)
accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000080)=0x1c)
04:40:58 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]})
io_setup(0x0, &(0x7f00000005c0))
ustat(0x0, &(0x7f00000000c0))
04:40:58 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
iopl(0x0)
04:40:58 executing program 5:
creat(&(0x7f0000000040)='./file0\x00', 0x0)
iopl(0x0)
04:40:58 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0)
accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x1c, 0x0)
04:40:58 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
socket$inet_tcp(0x2, 0x1, 0x0)
sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0)
04:40:58 executing program 2:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0)
04:40:58 executing program 4:
dup(0xffffffffffffffff)
accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000080)=0x1c)
04:40:58 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0)
getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/240, 0xf0)
04:40:58 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]})
io_setup(0x0, &(0x7f00000005c0))
ustat(0x0, &(0x7f00000000c0))
04:40:58 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50355}]})
syslog(0x0, &(0x7f0000003d00)=""/4096, 0x1000)
ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000300)={'syz_tun\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]})
04:40:59 executing program 5:
creat(&(0x7f0000000040)='./file0\x00', 0x0)
iopl(0x0)
04:40:59 executing program 2:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0)
04:40:59 executing program 4:
dup(0xffffffffffffffff)
accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000080)=0x1c)
04:40:59 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
socket$inet_tcp(0x2, 0x1, 0x0)
sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0)
04:40:59 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x1c, 0x0)
04:40:59 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]})
io_setup(0x0, &(0x7f00000005c0))
ustat(0x0, &(0x7f00000000c0))
04:40:59 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0)
getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/240, 0xf0)
04:40:59 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040))
ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0))
04:40:59 executing program 4:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
dup(0xffffffffffffffff)
accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000080)=0x1c)
04:40:59 executing program 5:
creat(&(0x7f0000000040)='./file0\x00', 0x0)
iopl(0x0)
04:40:59 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0)
04:40:59 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x1c, 0x0)
04:40:59 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0)
getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/240, 0xf0)
04:40:59 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0)
04:40:59 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040))
ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0))
04:40:59 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]})
io_setup(0x0, &(0x7f00000005c0))
ustat(0x0, &(0x7f00000000c0))
04:40:59 executing program 4:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
dup(0xffffffffffffffff)
accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000080)=0x1c)
04:40:59 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0)
04:40:59 executing program 5:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
creat(&(0x7f0000000040)='./file0\x00', 0x0)
iopl(0x0)
04:40:59 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x1c, 0x0)
04:40:59 executing program 4:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
dup(0xffffffffffffffff)
accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000080)=0x1c)
04:40:59 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0)
04:40:59 executing program 5:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
creat(&(0x7f0000000040)='./file0\x00', 0x0)
iopl(0x0)
04:40:59 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0)
getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/240, 0xf0)
04:40:59 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0)
04:40:59 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040))
ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0))
04:40:59 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]})
ustat(0x0, &(0x7f00000000c0))
04:41:00 executing program 0:
syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0)
accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x1c, 0x0)
04:41:00 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0)
04:41:00 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
dup(0xffffffffffffffff)
accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000080)=0x1c)
04:41:00 executing program 5:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
creat(&(0x7f0000000040)='./file0\x00', 0x0)
iopl(0x0)
04:41:00 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/240, 0xf0)
04:41:00 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040))
ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0))
04:41:00 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]})
ustat(0x0, &(0x7f00000000c0))
04:41:00 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0)
04:41:00 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0)
04:41:00 executing program 0:
syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0)
accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x1c, 0x0)
04:41:00 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
dup(0xffffffffffffffff)
accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000080)=0x1c)
04:41:00 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
creat(&(0x7f0000000040)='./file0\x00', 0x0)
iopl(0x0)
04:41:00 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/240, 0xf0)
04:41:00 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]})
ustat(0x0, &(0x7f00000000c0))
04:41:00 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0))
04:41:00 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
dup(0xffffffffffffffff)
accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000080)=0x1c)
04:41:00 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0)
04:41:00 executing program 1:
socket$inet_tcp(0x2, 0x1, 0x0)
sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0)
04:41:00 executing program 0:
syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0)
accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x1c, 0x0)
04:41:00 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
creat(&(0x7f0000000040)='./file0\x00', 0x0)
iopl(0x0)
04:41:00 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0))
04:41:00 executing program 6:
io_setup(0x0, &(0x7f00000005c0))
ustat(0x0, &(0x7f00000000c0))
04:41:00 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
dup(0xffffffffffffffff)
accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000080)=0x1c)
04:41:00 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/240, 0xf0)
04:41:00 executing program 1:
socket$inet_tcp(0x2, 0x1, 0x0)
sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0)
04:41:00 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0)
04:41:00 executing program 0:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0)
accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x1c, 0x0)
04:41:00 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
creat(&(0x7f0000000040)='./file0\x00', 0x0)
iopl(0x0)
[ 606.892952] kauditd_printk_skb: 5 callbacks suppressed
[ 606.892975] audit: type=1326 audit(1529728860.889:925): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5542 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:00 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
dup(0xffffffffffffffff)
accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000080)=0x1c)
04:41:00 executing program 6:
io_setup(0x0, &(0x7f00000005c0))
ustat(0x0, &(0x7f00000000c0))
04:41:00 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0))
04:41:01 executing program 3:
mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0)
getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/240, 0xf0)
04:41:01 executing program 1:
socket$inet_tcp(0x2, 0x1, 0x0)
sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0)
04:41:01 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
creat(&(0x7f0000000040)='./file0\x00', 0x0)
iopl(0x0)
04:41:01 executing program 0:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0)
accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x1c, 0x0)
04:41:01 executing program 6:
io_setup(0x0, &(0x7f00000005c0))
ustat(0x0, &(0x7f00000000c0))
04:41:01 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
dup(0xffffffffffffffff)
accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000080)=0x1c)
04:41:01 executing program 3:
mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0)
getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/240, 0xf0)
04:41:01 executing program 7:
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040))
ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0))
04:41:01 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
socket$inet_tcp(0x2, 0x1, 0x0)
sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0)
04:41:01 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
creat(&(0x7f0000000040)='./file0\x00', 0x0)
iopl(0x0)
04:41:01 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0)
04:41:01 executing program 6:
seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]})
io_setup(0x0, &(0x7f00000005c0))
ustat(0x0, &(0x7f00000000c0))
04:41:01 executing program 0:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0)
accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x1c, 0x0)
04:41:01 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
dup(0xffffffffffffffff)
accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000080)=0x1c)
04:41:01 executing program 3:
mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0)
getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/240, 0xf0)
04:41:01 executing program 7:
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040))
ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0))
04:41:01 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
socket$inet_tcp(0x2, 0x1, 0x0)
sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0)
04:41:01 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
creat(&(0x7f0000000040)='./file0\x00', 0x0)
iopl(0x0)
[ 607.810219] audit: type=1326 audit(1529728861.808:926): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5604 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:01 executing program 6:
seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]})
io_setup(0x0, &(0x7f00000005c0))
ustat(0x0, &(0x7f00000000c0))
04:41:01 executing program 3:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0)
getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/240, 0xf0)
[ 607.868651] audit: type=1326 audit(1529728861.867:927): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5614 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:01 executing program 7:
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040))
ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0))
04:41:01 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
socket$inet_tcp(0x2, 0x1, 0x0)
sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0)
04:41:01 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
creat(&(0x7f0000000040)='./file0\x00', 0x0)
iopl(0x0)
04:41:01 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0)
accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x1c, 0x0)
04:41:02 executing program 6:
seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]})
io_setup(0x0, &(0x7f00000005c0))
ustat(0x0, &(0x7f00000000c0))
04:41:02 executing program 3:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0)
getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/240, 0xf0)
[ 608.073374] audit: type=1326 audit(1529728862.071:928): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5630 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:02 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0)
04:41:02 executing program 7:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040))
ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0))
04:41:02 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0)
accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x1c, 0x0)
04:41:02 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)})
socket$inet_tcp(0x2, 0x1, 0x0)
sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0)
04:41:02 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000000c0)})
io_setup(0x0, &(0x7f00000005c0))
ustat(0x0, &(0x7f00000000c0))
04:41:02 executing program 3:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0)
getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/240, 0xf0)
04:41:02 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
dup(0xffffffffffffffff)
accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000080)=0x1c)
[ 608.800974] audit: type=1326 audit(1529728862.799:929): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5648 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:02 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0)
getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/240, 0xf0)
04:41:02 executing program 7:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040))
ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0))
04:41:02 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)})
socket$inet_tcp(0x2, 0x1, 0x0)
sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0)
[ 608.873593] audit: type=1326 audit(1529728862.856:930): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5649 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:02 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000000c0)})
io_setup(0x0, &(0x7f00000005c0))
ustat(0x0, &(0x7f00000000c0))
04:41:02 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0)
accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x1c, 0x0)
04:41:03 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
creat(&(0x7f0000000040)='./file0\x00', 0x0)
iopl(0x0)
04:41:03 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0)
getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/240, 0xf0)
04:41:03 executing program 7:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040))
ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0))
04:41:03 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)})
socket$inet_tcp(0x2, 0x1, 0x0)
sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0)
[ 609.114806] audit: type=1326 audit(1529728863.113:931): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5680 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:03 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
dup(0xffffffffffffffff)
accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000080)=0x1c)
04:41:03 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000000c0)})
io_setup(0x0, &(0x7f00000005c0))
ustat(0x0, &(0x7f00000000c0))
04:41:03 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0)
accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x1c, 0x0)
04:41:03 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0)
getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/240, 0xf0)
04:41:03 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]})
socket$inet_tcp(0x2, 0x1, 0x0)
sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0)
04:41:03 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040))
ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0))
04:41:03 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0)
connect$netlink(0xffffffffffffffff, &(0x7f00000000c0)=@unspec, 0xc)
[ 609.768146] audit: type=1326 audit(1529728863.766:932): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5704 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:03 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0)
getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/240, 0xf0)
04:41:03 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040))
ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0))
04:41:03 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]})
socket$inet_tcp(0x2, 0x1, 0x0)
sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0)
04:41:03 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x40000000050255}]})
io_setup(0x0, &(0x7f00000005c0))
ustat(0x0, &(0x7f00000000c0))
04:41:03 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0)
accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x1c, 0x0)
04:41:04 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
creat(&(0x7f0000000040)='./file0\x00', 0x0)
iopl(0x0)
04:41:04 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0)
connect$netlink(0xffffffffffffffff, &(0x7f00000000c0)=@unspec, 0xc)
04:41:04 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0)
getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/240, 0xf0)
04:41:04 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040))
ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0))
[ 610.181442] audit: type=1326 audit(1529728864.180:933): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5742 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:04 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0)
accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x1c, 0x0)
04:41:04 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x40000000050255}]})
io_setup(0x0, &(0x7f00000005c0))
ustat(0x0, &(0x7f00000000c0))
04:41:04 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]})
socket$inet_tcp(0x2, 0x1, 0x0)
sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0)
04:41:04 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0)
getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/240, 0xf0)
04:41:04 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022d}]})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040))
ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0))
04:41:04 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0)
connect$netlink(0xffffffffffffffff, &(0x7f00000000c0)=@unspec, 0xc)
04:41:04 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]})
epoll_create(0x0)
quotactl(0x0, &(0x7f0000002480)='./file0/file0\x00', 0x0, &(0x7f0000001440))
04:41:04 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0)
getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/240, 0xf0)
04:41:04 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022d}]})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040))
ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0))
04:41:04 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x40000000050255}]})
io_setup(0x0, &(0x7f00000005c0))
ustat(0x0, &(0x7f00000000c0))
04:41:04 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0)
accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x1c, 0x0)
04:41:04 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]})
socket$inet_tcp(0x2, 0x1, 0x0)
sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0)
[ 610.920896] audit: type=1326 audit(1529728864.919:934): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5770 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:05 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022d}]})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040))
ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0))
04:41:05 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0)
connect$netlink(0xffffffffffffffff, &(0x7f00000000c0)=@unspec, 0xc)
04:41:05 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]})
epoll_create(0x0)
quotactl(0x0, &(0x7f0000002480)='./file0/file0\x00', 0x0, &(0x7f0000001440))
04:41:05 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6}]})
io_setup(0x0, &(0x7f00000005c0))
ustat(0x0, &(0x7f00000000c0))
04:41:05 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
socket$inet_udp(0x2, 0x2, 0x0)
accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, @remote}, &(0x7f0000000140)=0x10, 0x0)
04:41:05 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040))
ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0))
04:41:05 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
connect$netlink(0xffffffffffffffff, &(0x7f00000000c0)=@unspec, 0xc)
04:41:05 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]})
epoll_create(0x0)
quotactl(0x0, &(0x7f0000002480)='./file0/file0\x00', 0x0, &(0x7f0000001440))
04:41:05 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
socket$inet_udp(0x2, 0x2, 0x0)
accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, @remote}, &(0x7f0000000140)=0x10, 0x0)
04:41:05 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
connect$netlink(0xffffffffffffffff, &(0x7f00000000c0)=@unspec, 0xc)
04:41:05 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]})
epoll_create(0x0)
quotactl(0x0, &(0x7f0000002480)='./file0/file0\x00', 0x0, &(0x7f0000001440))
04:41:05 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0)
getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/240, 0xf0)
04:41:05 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
socket$inet_udp(0x2, 0x2, 0x0)
accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, @remote}, &(0x7f0000000140)=0x10, 0x0)
04:41:05 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
connect$netlink(0xffffffffffffffff, &(0x7f00000000c0)=@unspec, 0xc)
04:41:05 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0)
accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x1c, 0x0)
04:41:05 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]})
quotactl(0x0, &(0x7f0000002480)='./file0/file0\x00', 0x0, &(0x7f0000001440))
04:41:05 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]})
socket$inet_tcp(0x2, 0x1, 0x0)
sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0)
[ 611.902361] kauditd_printk_skb: 5 callbacks suppressed
[ 611.902381] audit: type=1326 audit(1529728865.901:940): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5827 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:05 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]})
quotactl(0x0, &(0x7f0000002480)='./file0/file0\x00', 0x0, &(0x7f0000001440))
04:41:05 executing program 2:
openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0)
connect$netlink(0xffffffffffffffff, &(0x7f00000000c0)=@unspec, 0xc)
[ 612.001941] audit: type=1326 audit(1529728865.966:941): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5836 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:06 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6}]})
io_setup(0x0, &(0x7f00000005c0))
ustat(0x0, &(0x7f00000000c0))
04:41:06 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
socket$inet_udp(0x2, 0x2, 0x0)
accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, @remote}, &(0x7f0000000140)=0x10, 0x0)
04:41:06 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040))
ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0))
04:41:06 executing program 2:
openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0)
connect$netlink(0xffffffffffffffff, &(0x7f00000000c0)=@unspec, 0xc)
04:41:06 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]})
quotactl(0x0, &(0x7f0000002480)='./file0/file0\x00', 0x0, &(0x7f0000001440))
[ 612.159811] audit: type=1326 audit(1529728866.158:942): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5848 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:06 executing program 2:
openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0)
connect$netlink(0xffffffffffffffff, &(0x7f00000000c0)=@unspec, 0xc)
[ 612.271761] audit: type=1326 audit(1529728866.270:943): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5857 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:06 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, @remote}, &(0x7f0000000140)=0x10, 0x0)
04:41:06 executing program 4:
epoll_create(0x0)
quotactl(0x0, &(0x7f0000002480)='./file0/file0\x00', 0x0, &(0x7f0000001440))
04:41:06 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0)
getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/240, 0xf0)
04:41:06 executing program 2:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0)
connect$netlink(0xffffffffffffffff, &(0x7f00000000c0)=@unspec, 0xc)
04:41:06 executing program 4:
epoll_create(0x0)
quotactl(0x0, &(0x7f0000002480)='./file0/file0\x00', 0x0, &(0x7f0000001440))
[ 612.821975] audit: type=1326 audit(1529728866.820:944): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5880 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:06 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0)
accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x1c, 0x0)
04:41:06 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, @remote}, &(0x7f0000000140)=0x10, 0x0)
04:41:06 executing program 4:
epoll_create(0x0)
quotactl(0x0, &(0x7f0000002480)='./file0/file0\x00', 0x0, &(0x7f0000001440))
04:41:06 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]})
socket$inet_tcp(0x2, 0x1, 0x0)
sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0)
04:41:06 executing program 2:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0)
connect$netlink(0xffffffffffffffff, &(0x7f00000000c0)=@unspec, 0xc)
[ 612.939889] audit: type=1326 audit(1529728866.938:945): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5888 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
[ 613.011147] audit: type=1326 audit(1529728866.986:946): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5893 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:07 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6}]})
io_setup(0x0, &(0x7f00000005c0))
ustat(0x0, &(0x7f00000000c0))
04:41:07 executing program 4:
seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]})
epoll_create(0x0)
quotactl(0x0, &(0x7f0000002480)='./file0/file0\x00', 0x0, &(0x7f0000001440))
04:41:07 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040))
ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0))
04:41:07 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, @remote}, &(0x7f0000000140)=0x10, 0x0)
04:41:07 executing program 2:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0)
connect$netlink(0xffffffffffffffff, &(0x7f00000000c0)=@unspec, 0xc)
[ 613.149703] audit: type=1326 audit(1529728867.148:947): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5900 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:07 executing program 4:
seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]})
epoll_create(0x0)
quotactl(0x0, &(0x7f0000002480)='./file0/file0\x00', 0x0, &(0x7f0000001440))
[ 613.233298] audit: type=1326 audit(1529728867.231:948): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5906 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:07 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0)
connect$netlink(0xffffffffffffffff, &(0x7f00000000c0)=@unspec, 0xc)
04:41:07 executing program 4:
seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]})
epoll_create(0x0)
quotactl(0x0, &(0x7f0000002480)='./file0/file0\x00', 0x0, &(0x7f0000001440))
04:41:07 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)})
epoll_create(0x0)
quotactl(0x0, &(0x7f0000002480)='./file0/file0\x00', 0x0, &(0x7f0000001440))
04:41:07 executing program 5:
socket$inet_udp(0x2, 0x2, 0x0)
accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, @remote}, &(0x7f0000000140)=0x10, 0x0)
04:41:07 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0)
connect$netlink(0xffffffffffffffff, &(0x7f00000000c0)=@unspec, 0xc)
04:41:07 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=@newtaction={0x14, 0x30}, 0x14}, 0x1}, 0x0)
04:41:07 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0)
accept4$inet(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, @dev}, &(0x7f0000000500)=0x10, 0x0)
04:41:07 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0)
connect$netlink(0xffffffffffffffff, &(0x7f00000000c0)=@unspec, 0xc)
04:41:07 executing program 5:
socket$inet_udp(0x2, 0x2, 0x0)
accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, @remote}, &(0x7f0000000140)=0x10, 0x0)
04:41:07 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)})
epoll_create(0x0)
quotactl(0x0, &(0x7f0000002480)='./file0/file0\x00', 0x0, &(0x7f0000001440))
04:41:08 executing program 5:
socket$inet_udp(0x2, 0x2, 0x0)
accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, @remote}, &(0x7f0000000140)=0x10, 0x0)
04:41:08 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000300)=""/135)
04:41:08 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=@newtaction={0x14, 0x30}, 0x14}, 0x1}, 0x0)
04:41:08 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0)
connect$netlink(0xffffffffffffffff, &(0x7f00000000c0)=@unspec, 0xc)
04:41:08 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)})
epoll_create(0x0)
quotactl(0x0, &(0x7f0000002480)='./file0/file0\x00', 0x0, &(0x7f0000001440))
04:41:08 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x20)
ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, &(0x7f0000000080))
04:41:08 executing program 3:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
socket$inet6(0xa, 0x0, 0x0)
restart_syscall()
04:41:08 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0)
04:41:08 executing program 5:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
socket$inet_udp(0x2, 0x2, 0x0)
accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, @remote}, &(0x7f0000000140)=0x10, 0x0)
04:41:08 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0)
connect$netlink(0xffffffffffffffff, &(0x7f00000000c0)=@unspec, 0xc)
04:41:08 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x5000c}]})
epoll_create(0x0)
quotactl(0x0, &(0x7f0000002480)='./file0/file0\x00', 0x0, &(0x7f0000001440))
04:41:08 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000300)=""/135)
04:41:08 executing program 5:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
socket$inet_udp(0x2, 0x2, 0x0)
accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, @remote}, &(0x7f0000000140)=0x10, 0x0)
04:41:08 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=@newtaction={0x14, 0x30}, 0x14}, 0x1}, 0x0)
04:41:08 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080))
04:41:08 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0)
connect$netlink(0xffffffffffffffff, &(0x7f00000000c0)=@unspec, 0xc)
04:41:08 executing program 3:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
socket$inet6(0xa, 0x0, 0x0)
restart_syscall()
04:41:08 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x5000c}]})
epoll_create(0x0)
quotactl(0x0, &(0x7f0000002480)='./file0/file0\x00', 0x0, &(0x7f0000001440))
04:41:08 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0)
ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381)
04:41:08 executing program 5:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
socket$inet_udp(0x2, 0x2, 0x0)
accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, @remote}, &(0x7f0000000140)=0x10, 0x0)
04:41:08 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000300)=""/135)
04:41:08 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080))
04:41:08 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=@newtaction={0x14, 0x30}, 0x14}, 0x1}, 0x0)
04:41:08 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x5000c}]})
epoll_create(0x0)
quotactl(0x0, &(0x7f0000002480)='./file0/file0\x00', 0x0, &(0x7f0000001440))
04:41:08 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0)
connect$netlink(0xffffffffffffffff, &(0x7f00000000c0)=@unspec, 0xc)
04:41:08 executing program 3:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
socket$inet6(0xa, 0x0, 0x0)
restart_syscall()
04:41:08 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
socket$inet_udp(0x2, 0x2, 0x0)
accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, @remote}, &(0x7f0000000140)=0x10, 0x0)
04:41:08 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0)
ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381)
[ 614.915467] audit: type=1326 audit(1529728868.914:949): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6032 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:09 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000300)=""/135)
04:41:09 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]})
epoll_create(0x0)
quotactl(0x0, &(0x7f0000002480)='./file0/file0\x00', 0x0, &(0x7f0000001440))
04:41:09 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=@newtaction={0x14, 0x30}, 0x14}, 0x1}, 0x0)
04:41:09 executing program 3:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
socket$inet6(0xa, 0x0, 0x0)
restart_syscall()
04:41:09 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080))
04:41:09 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
socket$inet_udp(0x2, 0x2, 0x0)
accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, @remote}, &(0x7f0000000140)=0x10, 0x0)
04:41:09 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0)
ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381)
04:41:09 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000300)=""/135)
04:41:09 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=@newtaction={0x14, 0x30}, 0x14}, 0x1}, 0x0)
04:41:09 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
socket$inet_udp(0x2, 0x2, 0x0)
accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, @remote}, &(0x7f0000000140)=0x10, 0x0)
04:41:09 executing program 3:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
restart_syscall()
04:41:09 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080))
04:41:09 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0)
connect$netlink(0xffffffffffffffff, &(0x7f00000000c0)=@unspec, 0xc)
04:41:09 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000300)=""/135)
04:41:09 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0)
ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381)
04:41:09 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
socket$inet_udp(0x2, 0x2, 0x0)
accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, @remote}, &(0x7f0000000140)=0x10, 0x0)
04:41:09 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=@newtaction={0x14, 0x30}, 0x14}, 0x1}, 0x0)
04:41:10 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
socket$inet_udp(0x2, 0x2, 0x0)
accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, @remote}, &(0x7f0000000140)=0x10, 0x0)
04:41:10 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]})
epoll_create(0x0)
quotactl(0x0, &(0x7f0000002480)='./file0/file0\x00', 0x0, &(0x7f0000001440))
04:41:10 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000300)=""/135)
04:41:10 executing program 3:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
restart_syscall()
04:41:10 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080))
04:41:10 executing program 1:
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=@newtaction={0x14, 0x30}, 0x14}, 0x1}, 0x0)
04:41:10 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381)
04:41:10 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080))
04:41:10 executing program 1:
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=@newtaction={0x14, 0x30}, 0x14}, 0x1}, 0x0)
04:41:10 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
socket$inet_udp(0x2, 0x2, 0x0)
accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, @remote}, &(0x7f0000000140)=0x10, 0x0)
04:41:10 executing program 3:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
restart_syscall()
04:41:10 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0)
connect$netlink(0xffffffffffffffff, &(0x7f00000000c0)=@unspec, 0xc)
04:41:10 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381)
04:41:10 executing program 0:
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000300)=""/135)
04:41:10 executing program 1:
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=@newtaction={0x14, 0x30}, 0x14}, 0x1}, 0x0)
04:41:10 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080))
04:41:10 executing program 3:
socket$inet6(0xa, 0x0, 0x0)
restart_syscall()
04:41:10 executing program 6:
openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080))
04:41:10 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]})
epoll_create(0x0)
quotactl(0x0, &(0x7f0000002480)='./file0/file0\x00', 0x0, &(0x7f0000001440))
04:41:10 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
socket$inet_udp(0x2, 0x2, 0x0)
accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, @remote}, &(0x7f0000000140)=0x10, 0x0)
04:41:10 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381)
04:41:10 executing program 0:
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000300)=""/135)
04:41:10 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=@newtaction={0x14, 0x30}, 0x14}, 0x1}, 0x0)
04:41:10 executing program 3:
socket$inet6(0xa, 0x0, 0x0)
restart_syscall()
[ 617.015436] kauditd_printk_skb: 4 callbacks suppressed
[ 617.015467] audit: type=1326 audit(1529728871.014:954): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6160 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:11 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=@newtaction={0x14, 0x30}, 0x14}, 0x1}, 0x0)
04:41:11 executing program 6:
openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080))
[ 617.118924] audit: type=1326 audit(1529728871.066:955): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6166 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:11 executing program 0:
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000300)=""/135)
04:41:11 executing program 7:
openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0)
ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381)
04:41:11 executing program 3:
socket$inet6(0xa, 0x0, 0x0)
restart_syscall()
04:41:11 executing program 0:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000300)=""/135)
04:41:11 executing program 6:
openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080))
04:41:11 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=@newtaction={0x14, 0x30}, 0x14}, 0x1}, 0x0)
04:41:11 executing program 7:
openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0)
ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381)
04:41:11 executing program 6:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080))
04:41:12 executing program 3:
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
socket$inet6(0xa, 0x0, 0x0)
restart_syscall()
04:41:12 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=@newtaction={0x14, 0x30}, 0x14}, 0x1}, 0x0)
04:41:12 executing program 0:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000300)=""/135)
04:41:12 executing program 7:
openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0)
ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381)
04:41:12 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
socket$inet_udp(0x2, 0x2, 0x0)
accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, @remote}, &(0x7f0000000140)=0x10, 0x0)
04:41:12 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000080))
04:41:12 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0)
ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000080))
04:41:12 executing program 6:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080))
[ 618.059431] audit: type=1326 audit(1529728872.058:956): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6219 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:12 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=@newtaction={0x14, 0x30}, 0x14}, 0x1}, 0x0)
04:41:12 executing program 7:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0)
ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381)
04:41:12 executing program 0:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000300)=""/135)
04:41:12 executing program 6:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080))
04:41:12 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0)
ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000080))
04:41:12 executing program 7:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0)
ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381)
04:41:12 executing program 3:
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
socket$inet6(0xa, 0x0, 0x0)
restart_syscall()
04:41:12 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000080))
04:41:12 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=@newtaction={0x14, 0x30}, 0x14}, 0x1}, 0x0)
04:41:12 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080))
04:41:12 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000300)=""/135)
04:41:12 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0)
ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000080))
04:41:12 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
socket$inet_udp(0x2, 0x2, 0x0)
accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, @remote}, &(0x7f0000000140)=0x10, 0x0)
04:41:12 executing program 7:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0)
ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381)
04:41:12 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080))
04:41:12 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=@newtaction={0x14, 0x30}, 0x14}, 0x1}, 0x0)
04:41:12 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000300)=""/135)
04:41:12 executing program 3:
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
socket$inet6(0xa, 0x0, 0x0)
restart_syscall()
04:41:12 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000080))
04:41:12 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0)
ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000080))
04:41:13 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0)
ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381)
[ 619.037868] audit: type=1326 audit(1529728873.036:957): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6298 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:13 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000080))
04:41:13 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=@newtaction={0x14, 0x30}, 0x14}, 0x1}, 0x0)
04:41:13 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000300)=""/135)
04:41:13 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080))
04:41:13 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000080))
04:41:13 executing program 3:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)})
socket$inet6(0xa, 0x0, 0x0)
restart_syscall()
04:41:13 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0)
ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381)
04:41:13 executing program 3:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)})
socket$inet6(0xa, 0x0, 0x0)
restart_syscall()
04:41:13 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080))
04:41:13 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000300)=""/135)
04:41:13 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=@newtaction={0x14, 0x30}, 0x14}, 0x1}, 0x0)
04:41:13 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000080))
04:41:13 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0)
ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0)
04:41:13 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000080))
04:41:13 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0)
ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381)
04:41:14 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=@newtaction={0x14, 0x30}, 0x14}, 0x1}, 0x0)
04:41:14 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0)
ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381)
04:41:14 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080))
04:41:14 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000300)=""/135)
04:41:14 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000080))
04:41:14 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000080))
04:41:14 executing program 3:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)})
socket$inet6(0xa, 0x0, 0x0)
restart_syscall()
[ 620.215097] audit: type=1326 audit(1529728874.213:958): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6361 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:14 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0)
ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0)
04:41:14 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080))
04:41:14 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0)
ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381)
04:41:14 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000300)=""/135)
04:41:14 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000080))
04:41:14 executing program 3:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]})
socket$inet6(0xa, 0x0, 0x0)
restart_syscall()
04:41:14 executing program 2:
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0)
ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000080))
04:41:14 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080))
04:41:14 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0)
ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0)
[ 620.682164] audit: type=1326 audit(1529728874.680:959): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6406 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:15 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=@newtaction={0x14, 0x30}, 0x14}, 0x1}, 0x0)
04:41:15 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000300)=""/135)
04:41:15 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0)
ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381)
04:41:15 executing program 4:
openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000080))
04:41:15 executing program 2:
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0)
ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000080))
04:41:15 executing program 3:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]})
socket$inet6(0xa, 0x0, 0x0)
restart_syscall()
04:41:15 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0)
ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0)
[ 621.141727] audit: type=1326 audit(1529728875.140:960): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6415 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:15 executing program 4:
openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000080))
04:41:15 executing program 2:
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0)
ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000080))
[ 621.200627] audit: type=1326 audit(1529728875.188:961): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6427 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:15 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0)
ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381)
04:41:15 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0)
[ 621.329519] audit: type=1326 audit(1529728875.328:962): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6438 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:15 executing program 4:
openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000080))
04:41:15 executing program 3:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]})
socket$inet6(0xa, 0x0, 0x0)
restart_syscall()
04:41:15 executing program 2:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0)
ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000080))
04:41:15 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080))
04:41:15 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0)
[ 621.655111] audit: type=1326 audit(1529728875.653:963): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6462 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:16 executing program 4:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000080))
04:41:16 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0)
04:41:16 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=@newtaction={0x14, 0x30}, 0x14}, 0x1}, 0x0)
04:41:16 executing program 2:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0)
ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000080))
04:41:16 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000300)=""/135)
04:41:16 executing program 3:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]})
socket$inet6(0xa, 0x0, 0x0)
restart_syscall()
[ 622.127330] audit: type=1326 audit(1529728876.123:964): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6471 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:16 executing program 5:
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0)
ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0)
04:41:16 executing program 4:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000080))
[ 622.182316] audit: type=1326 audit(1529728876.154:965): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6478 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
[ 622.202139] audit: type=1326 audit(1529728876.166:966): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6468 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:16 executing program 2:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0)
ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000080))
04:41:16 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0)
ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381)
04:41:16 executing program 5:
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0)
ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0)
04:41:16 executing program 4:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000080))
04:41:16 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0)
ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000080))
[ 622.373256] audit: type=1326 audit(1529728876.371:967): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6492 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:16 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0)
ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000080))
04:41:16 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080))
04:41:16 executing program 5:
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0)
ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0)
04:41:16 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000080))
[ 622.657571] audit: type=1326 audit(1529728876.656:968): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6515 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:17 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000300)=""/135)
04:41:17 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0)
ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000080))
04:41:17 executing program 5:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0)
ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0)
04:41:17 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000080))
04:41:17 executing program 3:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]})
socket$inet6(0xa, 0x0, 0x0)
restart_syscall()
04:41:17 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0)
setresgid(0x0, 0x0, 0x0)
[ 623.125669] audit: type=1326 audit(1529728877.124:969): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6526 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:17 executing program 5:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0)
ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0)
04:41:17 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0)
ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000080))
[ 623.185842] audit: type=1326 audit(1529728877.167:970): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6529 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:17 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0)
ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381)
04:41:17 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000080))
04:41:17 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0)
setresgid(0x0, 0x0, 0x0)
04:41:17 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0)
ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000080))
04:41:17 executing program 5:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0)
ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0)
[ 623.370899] audit: type=1326 audit(1529728877.360:971): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6549 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:17 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)})
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0)
ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0)
04:41:17 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000080))
04:41:17 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0)
ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000080))
04:41:18 executing program 3:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]})
socket$inet6(0xa, 0x0, 0x0)
restart_syscall()
04:41:18 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0)
setresgid(0x0, 0x0, 0x0)
04:41:18 executing program 6:
seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x12000050180}]})
seccomp(0x0, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)})
timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000000c0))
04:41:18 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0)
ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000080))
04:41:18 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)})
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0)
ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0)
04:41:18 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000080))
04:41:18 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
socket$inet_udp(0x2, 0x2, 0x0)
socketpair(0x0, 0x0, 0x0, &(0x7f0000000100))
[ 624.093184] audit: type=1326 audit(1529728878.091:972): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6578 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:18 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000080))
[ 624.156163] audit: type=1326 audit(1529728878.125:973): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6579 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:18 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0)
setresgid(0x0, 0x0, 0x0)
04:41:18 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)})
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0)
ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0)
04:41:18 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0)
04:41:18 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000080))
04:41:18 executing program 6:
seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x12000050180}]})
seccomp(0x0, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)})
timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000000c0))
04:41:18 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0)
setresuid(0x0, 0x0, 0x0)
04:41:18 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022d}]})
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0)
ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0)
04:41:18 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
setresgid(0x0, 0x0, 0x0)
04:41:19 executing program 6:
seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x12000050180}]})
seccomp(0x0, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)})
timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000000c0))
04:41:19 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0)
04:41:19 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022d}]})
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0)
ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0)
04:41:19 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0)
setresuid(0x0, 0x0, 0x0)
04:41:19 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
setresgid(0x0, 0x0, 0x0)
04:41:19 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0)
lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)=@known='security.ima\x00', &(0x7f0000000300)=""/248, 0xf8)
04:41:19 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0)
ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000080))
04:41:19 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
setresgid(0x0, 0x0, 0x0)
04:41:19 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022d}]})
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0)
ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0)
04:41:19 executing program 6:
seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x12000050180}]})
seccomp(0x0, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)})
timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000000c0))
04:41:19 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0)
04:41:19 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000080))
04:41:19 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0)
setresuid(0x0, 0x0, 0x0)
04:41:19 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0)
lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)=@known='security.ima\x00', &(0x7f0000000300)=""/248, 0xf8)
04:41:19 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]})
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0)
ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0)
04:41:19 executing program 1:
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0)
setresgid(0x0, 0x0, 0x0)
04:41:19 executing program 6:
seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x12000050180}]})
timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000000c0))
04:41:19 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0)
04:41:19 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0)
setresuid(0x0, 0x0, 0x0)
04:41:19 executing program 1:
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0)
setresgid(0x0, 0x0, 0x0)
04:41:19 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0)
lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)=@known='security.ima\x00', &(0x7f0000000300)=""/248, 0xf8)
04:41:19 executing program 6:
seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x12000050180}]})
timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000000c0))
04:41:19 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0)
ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000080))
04:41:19 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
setresuid(0x0, 0x0, 0x0)
04:41:19 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0)
04:41:19 executing program 1:
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0)
setresgid(0x0, 0x0, 0x0)
04:41:19 executing program 6:
seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x12000050180}]})
timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000000c0))
04:41:20 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000080))
04:41:20 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0)
lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)=@known='security.ima\x00', &(0x7f0000000300)=""/248, 0xf8)
04:41:20 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0)
setresgid(0x0, 0x0, 0x0)
04:41:20 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
setresuid(0x0, 0x0, 0x0)
04:41:20 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]})
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0)
ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0)
04:41:20 executing program 6:
seccomp(0x0, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)})
timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000000c0))
04:41:20 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0)
04:41:20 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0)
setresgid(0x0, 0x0, 0x0)
04:41:20 executing program 6:
seccomp(0x0, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)})
timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000000c0))
04:41:20 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)=@known='security.ima\x00', &(0x7f0000000300)=""/248, 0xf8)
04:41:20 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0)
04:41:20 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0)
setresgid(0x0, 0x0, 0x0)
04:41:20 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
setresuid(0x0, 0x0, 0x0)
04:41:20 executing program 6:
seccomp(0x0, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)})
timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000000c0))
04:41:20 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)=@known='security.ima\x00', &(0x7f0000000300)=""/248, 0xf8)
04:41:20 executing program 7:
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0)
04:41:21 executing program 7:
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0)
04:41:21 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000180), 0x4)
04:41:21 executing program 6:
seccomp(0x0, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x12000050180}]})
seccomp(0x0, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)})
timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000000c0))
04:41:21 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)=@known='security.ima\x00', &(0x7f0000000300)=""/248, 0xf8)
04:41:21 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]})
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0)
ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0)
04:41:21 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)})
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0)
setresgid(0x0, 0x0, 0x0)
04:41:21 executing program 0:
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0)
setresuid(0x0, 0x0, 0x0)
04:41:21 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
creat(&(0x7f0000000040)='./file0\x00', 0x0)
bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080), 0x4)
04:41:21 executing program 6:
seccomp(0x0, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x12000050180}]})
seccomp(0x0, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)})
timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000000c0))
04:41:21 executing program 7:
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0)
04:41:21 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000180), 0x4)
04:41:21 executing program 3:
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0)
lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)=@known='security.ima\x00', &(0x7f0000000300)=""/248, 0xf8)
04:41:21 executing program 6:
seccomp(0x0, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x12000050180}]})
seccomp(0x0, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)})
timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000000c0))
[ 627.500197] kauditd_printk_skb: 7 callbacks suppressed
[ 627.500221] audit: type=1326 audit(1529728881.498:981): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6794 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:21 executing program 0:
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0)
setresuid(0x0, 0x0, 0x0)
04:41:21 executing program 7:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0)
04:41:21 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)})
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0)
setresgid(0x0, 0x0, 0x0)
04:41:21 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
creat(&(0x7f0000000040)='./file0\x00', 0x0)
bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080), 0x4)
04:41:21 executing program 3:
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0)
lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)=@known='security.ima\x00', &(0x7f0000000300)=""/248, 0xf8)
04:41:21 executing program 6:
seccomp(0x1, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000040)})
seccomp(0x0, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)})
timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000000c0))
04:41:21 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000180), 0x4)
04:41:22 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)})
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0)
setresgid(0x0, 0x0, 0x0)
04:41:22 executing program 0:
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0)
setresuid(0x0, 0x0, 0x0)
04:41:22 executing program 7:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0)
04:41:22 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
creat(&(0x7f0000000040)='./file0\x00', 0x0)
bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080), 0x4)
04:41:22 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000180), 0x4)
04:41:22 executing program 3:
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0)
lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)=@known='security.ima\x00', &(0x7f0000000300)=""/248, 0xf8)
04:41:22 executing program 6:
seccomp(0x1, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000040)})
seccomp(0x0, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)})
timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000000c0))
04:41:22 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000600)='/dev/hwrng\x00', 0x0, 0x0)
keyctl$assume_authority(0x10, 0x0)
04:41:22 executing program 6:
seccomp(0x1, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000040)})
seccomp(0x0, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)})
timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000000c0))
04:41:22 executing program 0:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0)
setresuid(0x0, 0x0, 0x0)
04:41:22 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]})
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0)
setresgid(0x0, 0x0, 0x0)
04:41:22 executing program 3:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0)
lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)=@known='security.ima\x00', &(0x7f0000000300)=""/248, 0xf8)
04:41:22 executing program 7:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0)
04:41:22 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000600)='/dev/hwrng\x00', 0x0, 0x0)
keyctl$assume_authority(0x10, 0x0)
04:41:22 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000180), 0x4)
04:41:22 executing program 6:
seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x12000050180}]})
seccomp(0x0, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)})
timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000000c0))
04:41:22 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
creat(&(0x7f0000000040)='./file0\x00', 0x0)
bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080), 0x4)
04:41:22 executing program 0:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0)
setresuid(0x0, 0x0, 0x0)
04:41:22 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]})
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0)
setresgid(0x0, 0x0, 0x0)
04:41:22 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)})
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0)
04:41:22 executing program 6:
seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x12000050180}]})
seccomp(0x0, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)})
timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000000c0))
04:41:22 executing program 3:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0)
lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)=@known='security.ima\x00', &(0x7f0000000300)=""/248, 0xf8)
04:41:22 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000180), 0x4)
04:41:22 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000600)='/dev/hwrng\x00', 0x0, 0x0)
keyctl$assume_authority(0x10, 0x0)
04:41:23 executing program 0:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0)
setresuid(0x0, 0x0, 0x0)
04:41:23 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)})
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0)
04:41:23 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]})
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0)
setresgid(0x0, 0x0, 0x0)
04:41:23 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080), 0x4)
04:41:23 executing program 6:
seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x12000050180}]})
seccomp(0x0, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)})
timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000000c0))
04:41:23 executing program 3:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0)
lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)=@known='security.ima\x00', &(0x7f0000000300)=""/248, 0xf8)
04:41:23 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000180), 0x4)
04:41:23 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
socketpair(0x0, 0x0, 0x0, &(0x7f0000000000))
ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000300)=""/249)
04:41:23 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0)
setresuid(0x0, 0x0, 0x0)
04:41:23 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]})
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0)
setresgid(0x0, 0x0, 0x0)
04:41:23 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)})
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0)
04:41:23 executing program 6:
seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000040)=[{0x6}]})
seccomp(0x0, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)})
timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000000c0))
04:41:23 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0)
lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)=@known='security.ima\x00', &(0x7f0000000300)=""/248, 0xf8)
04:41:23 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080), 0x4)
[ 629.392567] audit: type=1326 audit(1529728883.391:982): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6928 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:23 executing program 2:
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000180), 0x4)
04:41:23 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]})
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0)
[ 629.499240] audit: type=1326 audit(1529728883.457:983): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6933 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:23 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0)
setresuid(0x0, 0x0, 0x0)
04:41:23 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
socketpair(0x0, 0x0, 0x0, &(0x7f0000000000))
ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000300)=""/249)
04:41:23 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0)
lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)=@known='security.ima\x00', &(0x7f0000000300)=""/248, 0xf8)
04:41:23 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080), 0x4)
04:41:23 executing program 2:
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000180), 0x4)
04:41:23 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]})
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0)
04:41:23 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0)
setresuid(0x0, 0x0, 0x0)
04:41:23 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0)
lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)=@known='security.ima\x00', &(0x7f0000000300)=""/248, 0xf8)
04:41:23 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
socketpair(0x0, 0x0, 0x0, &(0x7f0000000000))
ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000300)=""/249)
04:41:24 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]})
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0)
setresgid(0x0, 0x0, 0x0)
04:41:24 executing program 2:
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000180), 0x4)
04:41:24 executing program 4:
creat(&(0x7f0000000040)='./file0\x00', 0x0)
bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080), 0x4)
04:41:24 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]})
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0)
04:41:24 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0)
setresuid(0x0, 0x0, 0x0)
04:41:24 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0)
lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)=@known='security.ima\x00', &(0x7f0000000300)=""/248, 0xf8)
04:41:24 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
socketpair(0x0, 0x0, 0x0, &(0x7f0000000000))
ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000300)=""/249)
04:41:24 executing program 6:
seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000040)=[{0x6}]})
seccomp(0x0, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)})
timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000000c0))
[ 630.390318] audit: type=1326 audit(1529728884.389:984): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6985 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:24 executing program 4:
creat(&(0x7f0000000040)='./file0\x00', 0x0)
bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080), 0x4)
04:41:24 executing program 2:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000180), 0x4)
04:41:24 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]})
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0)
04:41:24 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000300)=""/249)
[ 630.471166] audit: type=1326 audit(1529728884.410:985): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6996 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:24 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0)
setresuid(0x0, 0x0, 0x0)
04:41:24 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0)
lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)=@known='security.ima\x00', &(0x7f0000000300)=""/248, 0xf8)
04:41:24 executing program 4:
creat(&(0x7f0000000040)='./file0\x00', 0x0)
bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080), 0x4)
[ 630.613114] audit: type=1326 audit(1529728884.611:986): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7010 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:24 executing program 2:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000180), 0x4)
04:41:25 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]})
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0)
setresgid(0x0, 0x0, 0x0)
04:41:25 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000300)=""/249)
04:41:25 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0)
setresuid(0x0, 0x0, 0x0)
04:41:25 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0)
lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)=@known='security.ima\x00', &(0x7f0000000300)=""/248, 0xf8)
04:41:25 executing program 6:
seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000040)=[{0x6}]})
seccomp(0x0, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)})
timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000000c0))
04:41:25 executing program 4:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
creat(&(0x7f0000000040)='./file0\x00', 0x0)
bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080), 0x4)
04:41:25 executing program 2:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000180), 0x4)
[ 631.354405] audit: type=1326 audit(1529728885.350:987): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7035 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:25 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0)
lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)=@known='security.ima\x00', &(0x7f0000000300)=""/248, 0xf8)
04:41:25 executing program 4:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
creat(&(0x7f0000000040)='./file0\x00', 0x0)
bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080), 0x4)
04:41:25 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0)
setresuid(0x0, 0x0, 0x0)
[ 631.441108] audit: type=1326 audit(1529728885.421:988): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7038 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:25 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000180), 0x4)
04:41:25 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]})
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0)
04:41:25 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000300)=""/249)
[ 631.552621] audit: type=1326 audit(1529728885.500:989): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7053 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
[ 631.572507] audit: type=1326 audit(1529728885.527:990): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7056 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:25 executing program 4:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
creat(&(0x7f0000000040)='./file0\x00', 0x0)
bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080), 0x4)
04:41:25 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000180), 0x4)
04:41:25 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
creat(&(0x7f0000000040)='./file0\x00', 0x0)
bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080), 0x4)
04:41:26 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
keyctl$search(0xa, 0x0, &(0x7f0000000080)='cifs.idmap\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0)
04:41:26 executing program 5:
socketpair(0x0, 0x0, 0x0, &(0x7f0000000000))
ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000300)=""/249)
04:41:26 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
creat(&(0x7f0000000040)='./file0\x00', 0x0)
bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080), 0x4)
04:41:26 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000180), 0x4)
04:41:26 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
pipe(&(0x7f0000000400))
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)={0x0, @dev, @rand_addr}, &(0x7f0000000140)=0xc)
04:41:26 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
creat(&(0x7f0000000040)='./file0\x00', 0x0)
bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080), 0x4)
04:41:26 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000180), 0x4)
04:41:26 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0)
lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)=@known='security.ima\x00', &(0x7f0000000300)=""/248, 0xf8)
04:41:26 executing program 5:
socketpair(0x0, 0x0, 0x0, &(0x7f0000000000))
ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000300)=""/249)
04:41:26 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0)
setresuid(0x0, 0x0, 0x0)
04:41:26 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
creat(&(0x7f0000000040)='./file0\x00', 0x0)
bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080), 0x4)
[ 632.571675] kauditd_printk_skb: 1 callbacks suppressed
[ 632.571697] audit: type=1326 audit(1529728886.570:992): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7111 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:26 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]})
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0)
04:41:26 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
keyctl$search(0xa, 0x0, &(0x7f0000000080)='cifs.idmap\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0)
04:41:26 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]})
seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)})
getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000300)=""/156, &(0x7f0000000140)=0x9c)
04:41:26 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000180), 0x4)
04:41:26 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
creat(&(0x7f0000000040)='./file0\x00', 0x0)
bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080), 0x4)
04:41:26 executing program 5:
socketpair(0x0, 0x0, 0x0, &(0x7f0000000000))
ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000300)=""/249)
[ 632.714505] audit: type=1326 audit(1529728886.626:993): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7113 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
[ 632.734395] audit: type=1326 audit(1529728886.708:994): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7127 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:26 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
creat(&(0x7f0000000040)='./file0\x00', 0x0)
bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080), 0x4)
04:41:26 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000180), 0x4)
04:41:26 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
keyctl$search(0xa, 0x0, &(0x7f0000000080)='cifs.idmap\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0)
04:41:26 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]})
seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)})
getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000300)=""/156, &(0x7f0000000140)=0x9c)
04:41:26 executing program 5:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
socketpair(0x0, 0x0, 0x0, &(0x7f0000000000))
ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000300)=""/249)
04:41:27 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
creat(&(0x7f0000000040)='./file0\x00', 0x0)
bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080), 0x4)
[ 633.066596] audit: type=1326 audit(1529728887.065:995): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7155 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:27 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0)
lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)=@known='security.ima\x00', &(0x7f0000000300)=""/248, 0xf8)
04:41:27 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000180), 0x4)
04:41:27 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
keyctl$search(0xa, 0x0, &(0x7f0000000080)='cifs.idmap\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0)
04:41:27 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]})
seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)})
getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000300)=""/156, &(0x7f0000000140)=0x9c)
[ 633.550709] audit: type=1326 audit(1529728887.549:996): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7166 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
[ 633.578010] audit: type=1326 audit(1529728887.576:997): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7172 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:27 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
keyctl$search(0xa, 0x0, &(0x7f0000000080)='cifs.idmap\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0)
04:41:27 executing program 5:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
socketpair(0x0, 0x0, 0x0, &(0x7f0000000000))
ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000300)=""/249)
04:41:27 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0)
setresuid(0x0, 0x0, 0x0)
04:41:27 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]})
seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)})
getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000300)=""/156, &(0x7f0000000140)=0x9c)
[ 633.682216] audit: type=1326 audit(1529728887.680:998): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7174 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:27 executing program 5:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
socketpair(0x0, 0x0, 0x0, &(0x7f0000000000))
ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000300)=""/249)
04:41:27 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
keyctl$search(0xa, 0x0, &(0x7f0000000080)='cifs.idmap\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0)
04:41:27 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]})
getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000300)=""/156, &(0x7f0000000140)=0x9c)
04:41:27 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
keyctl$search(0xa, 0x0, &(0x7f0000000080)='cifs.idmap\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0)
04:41:27 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
socketpair(0x0, 0x0, 0x0, &(0x7f0000000000))
ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000300)=""/249)
04:41:28 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
creat(&(0x7f0000000040)='./file0\x00', 0x0)
bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080), 0x4)
04:41:28 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]})
getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000300)=""/156, &(0x7f0000000140)=0x9c)
04:41:28 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
socketpair(0x0, 0x0, 0x0, &(0x7f0000000000))
ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000300)=""/249)
[ 634.100390] audit: type=1326 audit(1529728888.099:999): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7207 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:28 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000180), 0x4)
04:41:28 executing program 6:
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
keyctl$search(0xa, 0x0, &(0x7f0000000080)='cifs.idmap\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0)
04:41:28 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
socketpair(0x0, 0x0, 0x0, &(0x7f0000000000))
ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000300)=""/249)
04:41:28 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]})
getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000300)=""/156, &(0x7f0000000140)=0x9c)
04:41:28 executing program 6:
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
keyctl$search(0xa, 0x0, &(0x7f0000000080)='cifs.idmap\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0)
[ 634.528579] audit: type=1326 audit(1529728888.527:1000): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7227 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:28 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
socketpair(0x0, 0x0, 0x0, &(0x7f0000000000))
ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000300)=""/249)
04:41:28 executing program 1:
seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)})
getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000300)=""/156, &(0x7f0000000140)=0x9c)
04:41:28 executing program 6:
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
keyctl$search(0xa, 0x0, &(0x7f0000000080)='cifs.idmap\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0)
04:41:28 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
socketpair(0x0, 0x0, 0x0, &(0x7f0000000000))
ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000300)=""/249)
04:41:28 executing program 1:
seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)})
getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000300)=""/156, &(0x7f0000000140)=0x9c)
04:41:28 executing program 6:
seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
keyctl$search(0xa, 0x0, &(0x7f0000000080)='cifs.idmap\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0)
04:41:28 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
socketpair(0x0, 0x0, 0x0, &(0x7f0000000000))
ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000300)=""/249)
04:41:28 executing program 1:
seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)})
getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000300)=""/156, &(0x7f0000000140)=0x9c)
04:41:28 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
creat(&(0x7f0000000040)='./file0\x00', 0x0)
bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080), 0x4)
04:41:29 executing program 6:
seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
keyctl$search(0xa, 0x0, &(0x7f0000000080)='cifs.idmap\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0)
04:41:29 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]})
seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)})
getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000300)=""/156, &(0x7f0000000140)=0x9c)
[ 635.027266] audit: type=1326 audit(1529728889.025:1001): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7268 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:29 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000180), 0x4)
04:41:29 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
socketpair(0x0, 0x0, 0x0, &(0x7f0000000000))
ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000300)=""/249)
04:41:29 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]})
seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)})
getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000300)=""/156, &(0x7f0000000140)=0x9c)
04:41:29 executing program 6:
seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
keyctl$search(0xa, 0x0, &(0x7f0000000080)='cifs.idmap\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0)
04:41:29 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]})
ustat(0x0, &(0x7f0000000100))
madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0)
04:41:29 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc)
sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f00000001c0)=@delsa={0x28, 0x11, 0x0, 0x0, 0x0, {@in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0x28}, 0x1}, 0x0)
04:41:29 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000))
ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0))
04:41:29 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
keyctl$search(0xa, 0x0, &(0x7f0000000080)='cifs.idmap\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0)
04:41:29 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]})
seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)})
getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000300)=""/156, &(0x7f0000000140)=0x9c)
04:41:29 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc)
sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f00000001c0)=@delsa={0x28, 0x11, 0x0, 0x0, 0x0, {@in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0x28}, 0x1}, 0x0)
04:41:29 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000))
ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0))
04:41:29 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]})
ustat(0x0, &(0x7f0000000100))
madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0)
04:41:29 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)})
seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)})
getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000300)=""/156, &(0x7f0000000140)=0x9c)
04:41:29 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc)
sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f00000001c0)=@delsa={0x28, 0x11, 0x0, 0x0, 0x0, {@in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0x28}, 0x1}, 0x0)
04:41:29 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
keyctl$search(0xa, 0x0, &(0x7f0000000080)='cifs.idmap\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0)
04:41:29 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]})
ustat(0x0, &(0x7f0000000100))
madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0)
04:41:30 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
socketpair(0x0, 0x0, 0x0, &(0x7f0000000000))
ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000300)=""/249)
04:41:30 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)})
seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)})
getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000300)=""/156, &(0x7f0000000140)=0x9c)
04:41:30 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000))
ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0))
04:41:30 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040))
ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000240), 0x0)
04:41:30 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
keyctl$search(0xa, 0x0, &(0x7f0000000080)='cifs.idmap\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0)
04:41:30 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc)
sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f00000001c0)=@delsa={0x28, 0x11, 0x0, 0x0, 0x0, {@in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0x28}, 0x1}, 0x0)
04:41:30 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50193}]})
seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)})
ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0))
04:41:30 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]})
ustat(0x0, &(0x7f0000000100))
madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0)
04:41:30 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)})
seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)})
getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000300)=""/156, &(0x7f0000000140)=0x9c)
04:41:30 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
keyctl$search(0xa, 0x0, &(0x7f0000000080)='cifs.idmap\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0)
04:41:30 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140))
ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080))
04:41:30 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f00000001c0)=@delsa={0x28, 0x11, 0x0, 0x0, 0x0, {@in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0x28}, 0x1}, 0x0)
04:41:30 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]})
madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0)
04:41:30 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50193}]})
seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)})
ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0))
04:41:30 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000))
ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0))
04:41:30 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]})
seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)})
getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000300)=""/156, &(0x7f0000000140)=0x9c)
04:41:31 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]})
madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0)
04:41:31 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140))
ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080))
04:41:31 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
keyctl$search(0xa, 0x0, &(0x7f0000000080)='cifs.idmap\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0)
04:41:31 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]})
seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)})
getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000300)=""/156, &(0x7f0000000140)=0x9c)
04:41:31 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f00000001c0)=@delsa={0x28, 0x11, 0x0, 0x0, 0x0, {@in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0x28}, 0x1}, 0x0)
04:41:31 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
socketpair(0x0, 0x0, 0x0, &(0x7f0000000000))
ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000300)=""/249)
04:41:31 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0))
04:41:31 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50193}]})
seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)})
ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0))
04:41:31 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
keyctl$search(0xa, 0x0, &(0x7f0000000080)='cifs.idmap\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0)
04:41:31 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]})
seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)})
getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000300)=""/156, &(0x7f0000000140)=0x9c)
04:41:31 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f00000001c0)=@delsa={0x28, 0x11, 0x0, 0x0, 0x0, {@in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0x28}, 0x1}, 0x0)
04:41:31 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]})
madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0)
04:41:31 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0))
04:41:31 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50193}]})
seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)})
ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0))
04:41:31 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140))
ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080))
04:41:31 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]})
seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)})
getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000300)=""/156, &(0x7f0000000140)=0x9c)
04:41:31 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
keyctl$search(0xa, 0x0, &(0x7f0000000080)='cifs.idmap\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0)
[ 637.763452] kauditd_printk_skb: 4 callbacks suppressed
[ 637.763481] audit: type=1326 audit(1529728891.762:1007): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7422 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
[ 637.851477] audit: type=1326 audit(1529728891.757:1006): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7421 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:32 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0))
04:41:32 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140))
ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080))
04:41:32 executing program 3:
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc)
sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f00000001c0)=@delsa={0x28, 0x11, 0x0, 0x0, 0x0, {@in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0x28}, 0x1}, 0x0)
04:41:32 executing program 7:
ustat(0x0, &(0x7f0000000100))
madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0)
04:41:32 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50193}]})
ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0))
04:41:32 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil)
ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000400))
04:41:32 executing program 3:
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc)
sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f00000001c0)=@delsa={0x28, 0x11, 0x0, 0x0, 0x0, {@in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0x28}, 0x1}, 0x0)
04:41:32 executing program 7:
ustat(0x0, &(0x7f0000000100))
madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0)
04:41:32 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil)
ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000400))
04:41:32 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50193}]})
ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0))
04:41:32 executing program 0:
socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000))
ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0))
04:41:32 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080))
04:41:32 executing program 3:
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc)
sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f00000001c0)=@delsa={0x28, 0x11, 0x0, 0x0, 0x0, {@in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0x28}, 0x1}, 0x0)
04:41:32 executing program 7:
ustat(0x0, &(0x7f0000000100))
madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0)
04:41:32 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]})
seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)})
getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000300)=""/156, &(0x7f0000000140)=0x9c)
04:41:32 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
keyctl$search(0xa, 0x0, &(0x7f0000000080)='cifs.idmap\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0)
04:41:32 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50193}]})
ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0))
04:41:32 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil)
ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000400))
04:41:32 executing program 0:
socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000))
ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0))
[ 638.818038] audit: type=1326 audit(1529728892.816:1008): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7472 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:32 executing program 7:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]})
ustat(0x0, &(0x7f0000000100))
madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0)
04:41:32 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080))
04:41:32 executing program 3:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc)
sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f00000001c0)=@delsa={0x28, 0x11, 0x0, 0x0, 0x0, {@in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0x28}, 0x1}, 0x0)
[ 638.928334] audit: type=1326 audit(1529728892.883:1009): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7475 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:33 executing program 2:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)})
ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0))
04:41:33 executing program 0:
socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000))
ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0))
04:41:33 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil)
ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000400))
04:41:33 executing program 7:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]})
ustat(0x0, &(0x7f0000000100))
madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0)
04:41:33 executing program 3:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc)
sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f00000001c0)=@delsa={0x28, 0x11, 0x0, 0x0, 0x0, {@in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0x28}, 0x1}, 0x0)
04:41:33 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080))
04:41:33 executing program 0:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000))
ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0))
04:41:33 executing program 2:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)})
ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0))
04:41:33 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]})
seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)})
getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000300)=""/156, &(0x7f0000000140)=0x9c)
04:41:33 executing program 7:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]})
ustat(0x0, &(0x7f0000000100))
madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0)
04:41:33 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000400))
04:41:33 executing program 0:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000))
ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0))
04:41:33 executing program 3:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc)
sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f00000001c0)=@delsa={0x28, 0x11, 0x0, 0x0, 0x0, {@in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0x28}, 0x1}, 0x0)
04:41:33 executing program 2:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)})
ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0))
04:41:33 executing program 4:
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140))
ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080))
04:41:33 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
keyctl$search(0xa, 0x0, &(0x7f0000000080)='cifs.idmap\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0)
[ 639.786137] audit: type=1326 audit(1529728893.784:1010): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7528 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:33 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000300)})
ustat(0x0, &(0x7f0000000100))
madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0)
04:41:33 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc)
sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f00000001c0)=@delsa={0x28, 0x11, 0x0, 0x0, 0x0, {@in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0x28}, 0x1}, 0x0)
[ 639.843928] audit: type=1326 audit(1529728893.831:1011): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7540 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:33 executing program 0:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000))
ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0))
04:41:33 executing program 4:
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140))
ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080))
04:41:33 executing program 2:
seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50193}]})
seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)})
ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0))
04:41:33 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000400))
04:41:34 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000300)})
ustat(0x0, &(0x7f0000000100))
madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0)
04:41:34 executing program 4:
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140))
ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080))
04:41:34 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6)
04:41:34 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000))
ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0))
04:41:34 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc)
sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f00000001c0)=@delsa={0x28, 0x11, 0x0, 0x0, 0x0, {@in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0x28}, 0x1}, 0x0)
04:41:34 executing program 2:
seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50193}]})
seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)})
ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0))
04:41:34 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000400))
04:41:34 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000300)})
ustat(0x0, &(0x7f0000000100))
madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0)
04:41:34 executing program 4:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140))
ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080))
04:41:34 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
socket$inet_tcp(0x2, 0x1, 0x0)
socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000))
04:41:34 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000))
ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0))
04:41:34 executing program 4:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140))
ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080))
04:41:34 executing program 2:
seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50193}]})
seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)})
ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0))
04:41:34 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x50355}]})
ustat(0x0, &(0x7f0000000100))
madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0)
04:41:34 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc)
sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f00000001c0)=@delsa={0x28, 0x11, 0x0, 0x0, 0x0, {@in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0x28}, 0x1}, 0x0)
04:41:34 executing program 5:
shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil)
ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000400))
04:41:35 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6)
04:41:35 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
socket$inet_tcp(0x2, 0x1, 0x0)
socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000))
04:41:35 executing program 4:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140))
ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080))
04:41:35 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000))
ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0))
04:41:35 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)})
seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)})
ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0))
04:41:35 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc)
sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f00000001c0)=@delsa={0x28, 0x11, 0x0, 0x0, 0x0, {@in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0x28}, 0x1}, 0x0)
04:41:35 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x50355}]})
ustat(0x0, &(0x7f0000000100))
madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0)
04:41:35 executing program 5:
shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil)
ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000400))
04:41:35 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6)
04:41:35 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
socket$inet_tcp(0x2, 0x1, 0x0)
socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000))
04:41:35 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)})
seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)})
ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0))
04:41:35 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140))
ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080))
04:41:35 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000))
ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0))
04:41:35 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x50355}]})
ustat(0x0, &(0x7f0000000100))
madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0)
04:41:35 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc)
sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f00000001c0)=@delsa={0x28, 0x11, 0x0, 0x0, 0x0, {@in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0x28}, 0x1}, 0x0)
04:41:35 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140))
ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080))
04:41:35 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000))
ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0))
04:41:35 executing program 5:
shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil)
ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000400))
04:41:35 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)})
seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)})
ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0))
04:41:35 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6}]})
ustat(0x0, &(0x7f0000000100))
madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0)
04:41:35 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc)
sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f00000001c0)=@delsa={0x28, 0x11, 0x0, 0x0, 0x0, {@in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0x28}, 0x1}, 0x0)
04:41:35 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
socket$inet_tcp(0x2, 0x1, 0x0)
socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000))
04:41:35 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6)
[ 641.734568] audit: type=1326 audit(1529728895.733:1012): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7671 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:35 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140))
ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080))
04:41:35 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50193}]})
seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)})
ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0))
04:41:35 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000))
ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0))
04:41:35 executing program 5:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil)
ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000400))
04:41:35 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc)
sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f00000001c0)=@delsa={0x28, 0x11, 0x0, 0x0, 0x0, {@in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0x28}, 0x1}, 0x0)
04:41:36 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000))
04:41:36 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6)
04:41:36 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50193}]})
seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)})
ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0))
04:41:36 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000))
ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0))
04:41:36 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022d}]})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140))
ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080))
[ 642.027117] audit: type=1326 audit(1529728896.025:1013): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7696 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:36 executing program 5:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil)
ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000400))
[ 642.142767] audit: type=1326 audit(1529728896.141:1014): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7705 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:36 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50193}]})
seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)})
ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0))
04:41:36 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6}]})
ustat(0x0, &(0x7f0000000100))
madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0)
04:41:36 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6)
04:41:36 executing program 5:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil)
ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000400))
04:41:36 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022d}]})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140))
ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080))
04:41:36 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000))
04:41:36 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]})
seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)})
ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0))
[ 642.656171] audit: type=1326 audit(1529728896.654:1015): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7725 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:36 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022d}]})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140))
ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080))
04:41:36 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil)
ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000400))
04:41:36 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc)
sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f00000001c0)=@delsa={0x28, 0x11, 0x0, 0x0, 0x0, {@in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0x28}, 0x1}, 0x0)
04:41:36 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000))
04:41:36 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6)
04:41:36 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140))
ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080))
[ 642.946750] kauditd_printk_skb: 1 callbacks suppressed
[ 642.946803] audit: type=1326 audit(1529728896.945:1017): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7752 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:37 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000))
ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0))
04:41:37 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil)
ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000400))
04:41:37 executing program 1:
socket$inet_tcp(0x2, 0x1, 0x0)
socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000))
04:41:37 executing program 6:
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6)
[ 643.014267] audit: type=1326 audit(1529728896.988:1018): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7756 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
[ 643.132774] audit: type=1326 audit(1529728897.131:1019): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7768 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:37 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6}]})
ustat(0x0, &(0x7f0000000100))
madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0)
04:41:37 executing program 1:
socket$inet_tcp(0x2, 0x1, 0x0)
socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000))
04:41:37 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil)
ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000400))
04:41:37 executing program 6:
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6)
04:41:37 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]})
seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)})
ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0))
04:41:37 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil)
ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000400))
[ 643.645297] audit: type=1326 audit(1529728897.643:1020): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7778 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:37 executing program 6:
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6)
04:41:37 executing program 1:
socket$inet_tcp(0x2, 0x1, 0x0)
socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000))
[ 643.708153] audit: type=1326 audit(1529728897.684:1021): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7785 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:37 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc)
sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f00000001c0)=@delsa={0x28, 0x11, 0x0, 0x0, 0x0, {@in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0x28}, 0x1}, 0x0)
04:41:37 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil)
ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000400))
04:41:37 executing program 6:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6)
04:41:37 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140))
ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080))
[ 643.954482] audit: type=1326 audit(1529728897.953:1022): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7803 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
[ 644.001289] audit: type=1326 audit(1529728897.995:1023): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7810 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:38 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000))
ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0))
04:41:38 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
socket$inet_tcp(0x2, 0x1, 0x0)
socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000))
04:41:38 executing program 6:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6)
04:41:38 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil)
ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000400))
[ 644.131542] audit: type=1326 audit(1529728898.130:1024): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7821 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:38 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]})
seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)})
ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0))
04:41:38 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil)
ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000400))
04:41:38 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
socket$inet_tcp(0x2, 0x1, 0x0)
socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000))
04:41:38 executing program 6:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6)
04:41:38 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
memfd_create(&(0x7f0000000080)='\x00', 0x0)
tgkill(0x0, 0x0, 0x0)
[ 644.625547] audit: type=1326 audit(1529728898.623:1025): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7831 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:38 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6)
04:41:38 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
socket$inet_tcp(0x2, 0x1, 0x0)
socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000))
[ 644.674456] audit: type=1326 audit(1529728898.671:1026): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7834 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:38 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6)
04:41:38 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6)
04:41:38 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
memfd_create(&(0x7f0000000080)='\x00', 0x0)
tgkill(0x0, 0x0, 0x0)
04:41:38 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)})
socket$inet_tcp(0x2, 0x1, 0x0)
socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000))
04:41:38 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140))
ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080))
04:41:39 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
memfd_create(&(0x7f0000000080)='\x00', 0x0)
tgkill(0x0, 0x0, 0x0)
04:41:39 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]})
unshare(0x0)
ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000001440))
04:41:39 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)})
socket$inet_tcp(0x2, 0x1, 0x0)
socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000))
04:41:39 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6)
04:41:39 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil)
ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000400))
04:41:39 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0)
04:41:39 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6)
04:41:39 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)})
socket$inet_tcp(0x2, 0x1, 0x0)
socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000))
04:41:39 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
memfd_create(&(0x7f0000000080)='\x00', 0x0)
tgkill(0x0, 0x0, 0x0)
04:41:39 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
pipe2(&(0x7f00000000c0), 0x0)
fcntl$getown(0xffffffffffffffff, 0x9)
04:41:39 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]})
unshare(0x0)
ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000001440))
04:41:39 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]})
socket$inet_tcp(0x2, 0x1, 0x0)
socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000))
04:41:39 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6)
04:41:39 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]})
unshare(0x0)
ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000001440))
04:41:39 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
tgkill(0x0, 0x0, 0x0)
04:41:39 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
pipe2(&(0x7f00000000c0), 0x0)
fcntl$getown(0xffffffffffffffff, 0x9)
04:41:39 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0)
04:41:39 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]})
socket$inet_tcp(0x2, 0x1, 0x0)
socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000))
04:41:39 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6)
04:41:39 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
pipe(&(0x7f0000000000))
04:41:40 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]})
socket$inet_tcp(0x2, 0x1, 0x0)
socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000))
04:41:40 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil)
ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000400))
04:41:40 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
pipe2(&(0x7f00000000c0), 0x0)
fcntl$getown(0xffffffffffffffff, 0x9)
04:41:40 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]})
unshare(0x0)
ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000001440))
04:41:40 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0)
04:41:40 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
pipe(&(0x7f0000000000))
04:41:40 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
tgkill(0x0, 0x0, 0x0)
04:41:40 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]})
socket$inet_tcp(0x2, 0x1, 0x0)
socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000))
04:41:40 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
tgkill(0x0, 0x0, 0x0)
04:41:40 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
pipe2(&(0x7f00000000c0), 0x0)
fcntl$getown(0xffffffffffffffff, 0x9)
04:41:40 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]})
ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000001440))
04:41:40 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
pipe(&(0x7f0000000000))
04:41:40 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0)
setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x0)
04:41:40 executing program 7:
memfd_create(&(0x7f0000000080)='\x00', 0x0)
tgkill(0x0, 0x0, 0x0)
04:41:40 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6)
04:41:40 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
fcntl$getown(0xffffffffffffffff, 0x9)
04:41:40 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]})
ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000001440))
04:41:41 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]})
ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000001440))
04:41:41 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
pipe(&(0x7f0000000000))
04:41:41 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0)
setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x0)
04:41:41 executing program 7:
memfd_create(&(0x7f0000000080)='\x00', 0x0)
tgkill(0x0, 0x0, 0x0)
04:41:41 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
fcntl$getown(0xffffffffffffffff, 0x9)
04:41:41 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0)
ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37)
04:41:41 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]})
socket$inet_tcp(0x2, 0x1, 0x0)
socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000))
04:41:41 executing program 7:
memfd_create(&(0x7f0000000080)='\x00', 0x0)
tgkill(0x0, 0x0, 0x0)
04:41:41 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
pipe(&(0x7f0000000000))
04:41:41 executing program 3:
unshare(0x0)
ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000001440))
04:41:41 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
fcntl$getown(0xffffffffffffffff, 0x9)
04:41:41 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0)
setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x0)
04:41:41 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0)
ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37)
04:41:41 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6)
04:41:41 executing program 7:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
memfd_create(&(0x7f0000000080)='\x00', 0x0)
tgkill(0x0, 0x0, 0x0)
04:41:41 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
pipe(&(0x7f0000000000))
04:41:41 executing program 3:
unshare(0x0)
ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000001440))
04:41:41 executing program 2:
pipe2(&(0x7f00000000c0), 0x0)
fcntl$getown(0xffffffffffffffff, 0x9)
04:41:41 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0)
ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37)
04:41:41 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0)
setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x0)
04:41:42 executing program 3:
unshare(0x0)
ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000001440))
04:41:42 executing program 7:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
memfd_create(&(0x7f0000000080)='\x00', 0x0)
tgkill(0x0, 0x0, 0x0)
[ 648.049021] kauditd_printk_skb: 7 callbacks suppressed
[ 648.055419] audit: type=1326 audit(1529728902.042:1034): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8045 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:42 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]})
socket$inet_tcp(0x2, 0x1, 0x0)
socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000))
04:41:42 executing program 2:
pipe2(&(0x7f00000000c0), 0x0)
fcntl$getown(0xffffffffffffffff, 0x9)
04:41:42 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
pipe(&(0x7f0000000000))
04:41:42 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0)
ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37)
04:41:42 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x0)
04:41:42 executing program 3:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]})
unshare(0x0)
ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000001440))
04:41:42 executing program 7:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
memfd_create(&(0x7f0000000080)='\x00', 0x0)
tgkill(0x0, 0x0, 0x0)
[ 648.667037] audit: type=1326 audit(1529728902.665:1035): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8061 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:42 executing program 2:
pipe2(&(0x7f00000000c0), 0x0)
fcntl$getown(0xffffffffffffffff, 0x9)
04:41:42 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
memfd_create(&(0x7f0000000080)='\x00', 0x0)
tgkill(0x0, 0x0, 0x0)
04:41:42 executing program 3:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]})
unshare(0x0)
ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000001440))
04:41:42 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37)
04:41:42 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x0)
04:41:42 executing program 4:
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
pipe(&(0x7f0000000000))
04:41:42 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]})
dup(0xffffffffffffffff)
getpeername$netlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xc)
04:41:43 executing program 2:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
pipe2(&(0x7f00000000c0), 0x0)
fcntl$getown(0xffffffffffffffff, 0x9)
04:41:43 executing program 4:
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
pipe(&(0x7f0000000000))
04:41:43 executing program 2:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
pipe2(&(0x7f00000000c0), 0x0)
fcntl$getown(0xffffffffffffffff, 0x9)
04:41:43 executing program 3:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]})
unshare(0x0)
ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000001440))
04:41:43 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
memfd_create(&(0x7f0000000080)='\x00', 0x0)
tgkill(0x0, 0x0, 0x0)
04:41:43 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37)
04:41:43 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x0)
04:41:43 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]})
fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000100))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000001c0))
04:41:43 executing program 4:
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
pipe(&(0x7f0000000000))
04:41:43 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil)
getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000080)=0x1e)
04:41:43 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000300)})
unshare(0x0)
ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000001440))
04:41:43 executing program 2:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
pipe2(&(0x7f00000000c0), 0x0)
fcntl$getown(0xffffffffffffffff, 0x9)
04:41:43 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
memfd_create(&(0x7f0000000080)='\x00', 0x0)
tgkill(0x0, 0x0, 0x0)
04:41:43 executing program 4:
seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
pipe(&(0x7f0000000000))
04:41:43 executing program 0:
openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0)
setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x0)
04:41:43 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37)
04:41:43 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0)
setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in=@rand_addr}}, 0xe8)
04:41:43 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil)
getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000080)=0x1e)
04:41:43 executing program 4:
seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
pipe(&(0x7f0000000000))
04:41:43 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000300)})
unshare(0x0)
ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000001440))
04:41:44 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
memfd_create(&(0x7f0000000080)='\x00', 0x0)
tgkill(0x0, 0x0, 0x0)
04:41:44 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)})
pipe2(&(0x7f00000000c0), 0x0)
fcntl$getown(0xffffffffffffffff, 0x9)
04:41:44 executing program 0:
openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0)
setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x0)
04:41:44 executing program 5:
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0)
ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37)
04:41:44 executing program 4:
seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
pipe(&(0x7f0000000000))
04:41:44 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000300)})
unshare(0x0)
ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000001440))
04:41:44 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil)
getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000080)=0x1e)
04:41:44 executing program 5:
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0)
ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37)
04:41:44 executing program 0:
openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0)
setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x0)
04:41:44 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
memfd_create(&(0x7f0000000080)='\x00', 0x0)
tgkill(0x0, 0x0, 0x0)
04:41:44 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)})
pipe2(&(0x7f00000000c0), 0x0)
fcntl$getown(0xffffffffffffffff, 0x9)
04:41:44 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0)
setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in=@rand_addr}}, 0xe8)
04:41:44 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
pipe(&(0x7f0000000000))
04:41:44 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x50355}]})
unshare(0x0)
ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000001440))
04:41:44 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil)
getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000080)=0x1e)
04:41:44 executing program 5:
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0)
ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37)
04:41:44 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
memfd_create(&(0x7f0000000080)='\x00', 0x0)
tgkill(0x0, 0x0, 0x0)
04:41:44 executing program 0:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0)
setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x0)
04:41:44 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)})
pipe2(&(0x7f00000000c0), 0x0)
fcntl$getown(0xffffffffffffffff, 0x9)
04:41:44 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0)
setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in=@rand_addr}}, 0xe8)
04:41:44 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x50355}]})
unshare(0x0)
ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000001440))
04:41:44 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
pipe(&(0x7f0000000000))
04:41:44 executing program 0:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0)
setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x0)
04:41:44 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
memfd_create(&(0x7f0000000080)='\x00', 0x0)
tgkill(0x0, 0x0, 0x0)
04:41:44 executing program 5:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0)
ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37)
04:41:44 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000080)=0x1e)
04:41:44 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]})
pipe2(&(0x7f00000000c0), 0x0)
fcntl$getown(0xffffffffffffffff, 0x9)
04:41:44 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x50355}]})
unshare(0x0)
ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000001440))
[ 650.874995] audit: type=1326 audit(1529728904.873:1036): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8232 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:44 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
pipe(&(0x7f0000000000))
04:41:45 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0)
setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in=@rand_addr}}, 0xe8)
04:41:45 executing program 0:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0)
setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x0)
04:41:45 executing program 5:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0)
ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37)
04:41:45 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]})
pipe2(&(0x7f00000000c0), 0x0)
fcntl$getown(0xffffffffffffffff, 0x9)
04:41:45 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000080)=0x1e)
04:41:45 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6}]})
unshare(0x0)
ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000001440))
04:41:45 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
pipe(&(0x7f0000000000))
04:41:45 executing program 5:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0)
ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37)
[ 651.208844] audit: type=1326 audit(1529728905.207:1037): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8265 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:45 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)})
openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0)
setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x0)
04:41:45 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]})
pipe2(&(0x7f00000000c0), 0x0)
fcntl$getown(0xffffffffffffffff, 0x9)
04:41:45 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
memfd_create(&(0x7f0000000080)='\x00', 0x0)
tgkill(0x0, 0x0, 0x0)
04:41:45 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in=@rand_addr}}, 0xe8)
04:41:45 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000080)=0x1e)
04:41:45 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
pipe(&(0x7f0000000000))
04:41:45 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)})
openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0)
setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x0)
04:41:45 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]})
pipe2(&(0x7f00000000c0), 0x0)
fcntl$getown(0xffffffffffffffff, 0x9)
04:41:45 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0)
ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37)
[ 651.803136] audit: type=1326 audit(1529728905.801:1038): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8289 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:45 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0)
ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37)
04:41:45 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
pipe(&(0x7f0000000000))
[ 651.870298] audit: type=1326 audit(1529728905.847:1039): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8299 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:45 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)})
openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0)
setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x0)
04:41:45 executing program 1:
shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil)
getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000080)=0x1e)
04:41:46 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6}]})
unshare(0x0)
ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000001440))
04:41:46 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in=@rand_addr}}, 0xe8)
04:41:46 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
pipe(&(0x7f0000000000))
04:41:46 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0)
ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37)
04:41:46 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022d}]})
openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0)
setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x0)
[ 652.164880] audit: type=1326 audit(1529728906.163:1040): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8320 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
[ 652.233373] audit: type=1326 audit(1529728906.231:1041): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8328 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:46 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
memfd_create(&(0x7f0000000080)='\x00', 0x0)
tgkill(0x0, 0x0, 0x0)
04:41:46 executing program 1:
shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil)
getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000080)=0x1e)
04:41:46 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0)
ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37)
04:41:46 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022d}]})
openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0)
setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x0)
04:41:46 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in=@rand_addr}}, 0xe8)
04:41:46 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]})
pipe2(&(0x7f00000000c0), 0x0)
fcntl$getown(0xffffffffffffffff, 0x9)
[ 652.764484] audit: type=1326 audit(1529728906.763:1042): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8336 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:46 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022d}]})
openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0)
setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x0)
04:41:46 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0)
ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37)
[ 652.828728] audit: type=1326 audit(1529728906.811:1043): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8344 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:46 executing program 6:
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0)
setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in=@rand_addr}}, 0xe8)
04:41:46 executing program 1:
shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil)
getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000080)=0x1e)
04:41:47 executing program 6:
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0)
setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in=@rand_addr}}, 0xe8)
04:41:47 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]})
openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0)
setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x0)
04:41:47 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6}]})
unshare(0x0)
ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000001440))
04:41:47 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil)
getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000080)=0x1e)
04:41:47 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0)
ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37)
04:41:47 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
pipe(&(0x7f0000000000))
[ 653.211455] audit: type=1326 audit(1529728907.210:1044): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8373 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
[ 653.265522] audit: type=1326 audit(1529728907.254:1045): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8381 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
[ 653.297878] audit: type=1326 audit(1529728907.293:1046): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8376 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:47 executing program 6:
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0)
setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in=@rand_addr}}, 0xe8)
04:41:47 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil)
getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000080)=0x1e)
04:41:47 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0)
ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37)
04:41:47 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
socket$inet_icmp_raw(0x2, 0x3, 0x1)
ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f00000000c0))
[ 653.709583] audit: type=1326 audit(1529728907.708:1047): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8388 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:47 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil)
getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000080)=0x1e)
04:41:47 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]})
pipe2(&(0x7f00000000c0), 0x0)
fcntl$getown(0xffffffffffffffff, 0x9)
04:41:47 executing program 6:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0)
setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in=@rand_addr}}, 0xe8)
04:41:47 executing program 6:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0)
setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in=@rand_addr}}, 0xe8)
[ 653.862198] audit: type=1326 audit(1529728907.860:1048): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8400 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:47 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil)
getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000080)=0x1e)
04:41:47 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]})
getpgrp(0xffffffffffffffff)
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x0, 0x0)
04:41:48 executing program 6:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0)
setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in=@rand_addr}}, 0xe8)
04:41:48 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]})
openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0)
setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x0)
04:41:48 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0)
04:41:48 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil)
getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000080)=0x1e)
04:41:48 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)})
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0)
setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in=@rand_addr}}, 0xe8)
04:41:48 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180))
ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080))
04:41:48 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
pipe(&(0x7f0000000000))
[ 654.211584] audit: type=1326 audit(1529728908.210:1049): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8425 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
[ 654.313318] audit: type=1326 audit(1529728908.288:1050): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8435 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:48 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil)
getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000080)=0x1e)
04:41:48 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0)
ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37)
04:41:48 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)})
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0)
setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in=@rand_addr}}, 0xe8)
04:41:48 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180))
ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080))
[ 654.663445] audit: type=1326 audit(1529728908.662:1051): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8454 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:48 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil)
getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000080)=0x1e)
04:41:48 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0)
04:41:48 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)})
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0)
setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in=@rand_addr}}, 0xe8)
04:41:48 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180))
ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080))
04:41:48 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
socket$inet_tcp(0x2, 0x1, 0x0)
semget(0xffffffffffffffff, 0x0, 0x0)
04:41:48 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil)
getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000080)=0x1e)
04:41:49 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]})
openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0)
setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x0)
04:41:49 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]})
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0)
setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in=@rand_addr}}, 0xe8)
04:41:49 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0)
04:41:49 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180))
ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080))
04:41:49 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
socket$inet_tcp(0x2, 0x1, 0x0)
semget(0xffffffffffffffff, 0x0, 0x0)
[ 655.171344] audit: type=1326 audit(1529728909.167:1052): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8490 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:49 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]})
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0)
setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in=@rand_addr}}, 0xe8)
04:41:49 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil)
getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000080)=0x1e)
04:41:49 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0)
ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37)
04:41:49 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
getpgid(0x0)
04:41:49 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080))
04:41:49 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0)
04:41:49 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
socket$inet_tcp(0x2, 0x1, 0x0)
semget(0xffffffffffffffff, 0x0, 0x0)
04:41:49 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil)
getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000080)=0x1e)
04:41:49 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]})
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0)
setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in=@rand_addr}}, 0xe8)
[ 655.616470] audit: type=1326 audit(1529728909.614:1053): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8505 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:49 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]})
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0)
setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in=@rand_addr}}, 0xe8)
04:41:49 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080))
04:41:50 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080))
04:41:50 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0)
04:41:50 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
socket$inet_tcp(0x2, 0x1, 0x0)
semget(0xffffffffffffffff, 0x0, 0x0)
04:41:50 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
getpgid(0x0)
04:41:50 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080)=0xffffffffffffff52, 0x0)
ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0)
04:41:50 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0)
04:41:50 executing program 3:
socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180))
ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080))
04:41:50 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080)=0xffffffffffffff52, 0x0)
ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0)
04:41:50 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000100))
ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0)
04:41:50 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
getpgid(0x0)
04:41:50 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil)
getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000080)=0x1e)
04:41:50 executing program 3:
socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180))
ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080))
04:41:50 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0)
04:41:50 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000000c0)=ANY=[])
04:41:50 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]})
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0)
setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in=@rand_addr}}, 0xe8)
04:41:50 executing program 3:
socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180))
ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080))
04:41:50 executing program 7:
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0)
04:41:50 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080)=0xffffffffffffff52, 0x0)
ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0)
04:41:50 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
getpgid(0x0)
04:41:50 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000100))
ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0)
04:41:50 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000000c0)=ANY=[])
04:41:50 executing program 3:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180))
ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080))
04:41:50 executing program 7:
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0)
04:41:51 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080)=0xffffffffffffff52, 0x0)
ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0)
04:41:51 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
getpgid(0x0)
04:41:51 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000100))
ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0)
04:41:51 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil)
getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000080)=0x1e)
04:41:51 executing program 3:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180))
ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080))
04:41:51 executing program 7:
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0)
04:41:51 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000000c0)=ANY=[])
04:41:51 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000100))
ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0)
04:41:51 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]})
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0)
setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in=@rand_addr}}, 0xe8)
04:41:51 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
getpgid(0x0)
04:41:51 executing program 3:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180))
ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080))
04:41:51 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0)
04:41:51 executing program 7:
seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0)
04:41:51 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000000c0)=ANY=[])
04:41:51 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0)
04:41:51 executing program 7:
seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0)
04:41:51 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)})
socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180))
ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080))
04:41:51 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
getpgid(0x0)
04:41:51 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0)
04:41:52 executing program 7:
seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0)
04:41:52 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000000c0)=ANY=[])
04:41:52 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)})
socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180))
ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080))
04:41:52 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0)
04:41:52 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc)
init_module(&(0x7f0000000500)='posix_acl_accessself\x00', 0x15, &(0x7f0000000580)='$,\x00')
04:41:52 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)})
socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180))
ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080))
04:41:52 executing program 4:
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
getpgid(0x0)
04:41:52 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0)
04:41:52 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000080)=""/131)
04:41:52 executing program 0:
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080)=0xffffffffffffff52, 0x0)
ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0)
04:41:52 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000180)})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0)
04:41:52 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000000c0)=ANY=[])
04:41:52 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc)
init_module(&(0x7f0000000500)='posix_acl_accessself\x00', 0x15, &(0x7f0000000580)='$,\x00')
04:41:52 executing program 4:
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
getpgid(0x0)
04:41:52 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]})
socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180))
ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080))
04:41:52 executing program 0:
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080)=0xffffffffffffff52, 0x0)
ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0)
04:41:52 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000180)})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0)
04:41:52 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0)
04:41:52 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000000c0)=ANY=[])
04:41:52 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc)
init_module(&(0x7f0000000500)='posix_acl_accessself\x00', 0x15, &(0x7f0000000580)='$,\x00')
04:41:52 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000080)=""/131)
04:41:53 executing program 4:
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
getpgid(0x0)
04:41:53 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]})
socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180))
ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080))
04:41:53 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000180)})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0)
04:41:53 executing program 0:
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080)=0xffffffffffffff52, 0x0)
ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0)
04:41:53 executing program 2:
socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000100))
ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0)
04:41:53 executing program 5:
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000000c0)=ANY=[])
04:41:53 executing program 4:
seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
getpgid(0x0)
04:41:53 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc)
init_module(&(0x7f0000000500)='posix_acl_accessself\x00', 0x15, &(0x7f0000000580)='$,\x00')
04:41:53 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
setuid(0x0)
04:41:53 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]})
socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180))
ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080))
04:41:53 executing program 0:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080)=0xffffffffffffff52, 0x0)
ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0)
04:41:53 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0)
04:41:53 executing program 5:
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000000c0)=ANY=[])
04:41:53 executing program 2:
socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000100))
ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0)
04:41:53 executing program 4:
seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
getpgid(0x0)
04:41:53 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]})
socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180))
ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080))
04:41:53 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
setuid(0x0)
04:41:53 executing program 0:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080)=0xffffffffffffff52, 0x0)
ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0)
04:41:53 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
init_module(&(0x7f0000000500)='posix_acl_accessself\x00', 0x15, &(0x7f0000000580)='$,\x00')
04:41:53 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0)
[ 659.660824] kauditd_printk_skb: 6 callbacks suppressed
[ 659.660848] audit: type=1326 audit(1529728913.659:1060): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8777 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:53 executing program 5:
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000000c0)=ANY=[])
04:41:53 executing program 2:
socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000100))
ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0)
04:41:53 executing program 4:
seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
getpgid(0x0)
04:41:53 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
init_module(&(0x7f0000000500)='posix_acl_accessself\x00', 0x15, &(0x7f0000000580)='$,\x00')
04:41:53 executing program 0:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080)=0xffffffffffffff52, 0x0)
ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0)
04:41:53 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0)
04:41:53 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
setuid(0x0)
04:41:53 executing program 5:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000000c0)=ANY=[])
04:41:54 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
getpgid(0x0)
04:41:54 executing program 2:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000100))
ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0)
04:41:54 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)})
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080)=0xffffffffffffff52, 0x0)
ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0)
04:41:54 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]})
socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180))
ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080))
04:41:54 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
init_module(&(0x7f0000000500)='posix_acl_accessself\x00', 0x15, &(0x7f0000000580)='$,\x00')
04:41:54 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0)
04:41:54 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
setuid(0x0)
04:41:54 executing program 5:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000000c0)=ANY=[])
04:41:54 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
getpgid(0x0)
04:41:54 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)})
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080)=0xffffffffffffff52, 0x0)
ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0)
04:41:54 executing program 2:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000100))
ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0)
[ 660.569378] audit: type=1326 audit(1529728914.568:1061): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8841 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:54 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
getpgid(0x0)
04:41:54 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)})
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080)=0xffffffffffffff52, 0x0)
ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0)
[ 660.652870] audit: type=1326 audit(1529728914.611:1062): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8851 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:54 executing program 5:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000000c0)=ANY=[])
04:41:54 executing program 1:
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc)
init_module(&(0x7f0000000500)='posix_acl_accessself\x00', 0x15, &(0x7f0000000580)='$,\x00')
04:41:54 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
setuid(0x0)
04:41:54 executing program 2:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000100))
ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0)
04:41:54 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]})
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080)=0xffffffffffffff52, 0x0)
ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0)
04:41:54 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
getpgid(0x0)
04:41:55 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]})
socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180))
ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080))
04:41:55 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000000c0)=ANY=[])
04:41:55 executing program 1:
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc)
init_module(&(0x7f0000000500)='posix_acl_accessself\x00', 0x15, &(0x7f0000000580)='$,\x00')
04:41:55 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]})
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080)=0xffffffffffffff52, 0x0)
ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0)
04:41:55 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
setuid(0x0)
04:41:55 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)})
socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000100))
ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0)
04:41:55 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
getpgid(0x0)
04:41:55 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0)
[ 661.552924] audit: type=1326 audit(1529728915.551:1063): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8895 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:55 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]})
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080)=0xffffffffffffff52, 0x0)
ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0)
04:41:55 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
getpgid(0x0)
04:41:55 executing program 1:
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc)
init_module(&(0x7f0000000500)='posix_acl_accessself\x00', 0x15, &(0x7f0000000580)='$,\x00')
[ 661.616242] audit: type=1326 audit(1529728915.613:1064): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8891 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:55 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000000c0)=ANY=[])
04:41:55 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
setuid(0x0)
04:41:55 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)})
socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000100))
ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0)
04:41:55 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc)
init_module(&(0x7f0000000500)='posix_acl_accessself\x00', 0x15, &(0x7f0000000580)='$,\x00')
04:41:55 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000000c0)=ANY=[])
04:41:56 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000000c0)=ANY=[])
04:41:56 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]})
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080)=0xffffffffffffff52, 0x0)
ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0)
04:41:56 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
getpgid(0x0)
04:41:56 executing program 6:
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
setuid(0x0)
04:41:56 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc)
init_module(&(0x7f0000000500)='posix_acl_accessself\x00', 0x15, &(0x7f0000000580)='$,\x00')
04:41:56 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)})
socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000100))
ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0)
04:41:56 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
seccomp(0x0, 0x0, &(0x7f0000000040))
getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000280)={@local}, &(0x7f00000002c0)=0x14)
04:41:56 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0)
[ 662.477710] audit: type=1326 audit(1529728916.476:1065): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8946 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:56 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc)
init_module(&(0x7f0000000500)='posix_acl_accessself\x00', 0x15, &(0x7f0000000580)='$,\x00')
04:41:56 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000000c0)=ANY=[])
04:41:56 executing program 6:
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
setuid(0x0)
[ 662.571194] audit: type=1326 audit(1529728916.497:1066): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8948 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
[ 662.590994] audit: type=1326 audit(1529728916.560:1067): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8960 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:56 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]})
socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000100))
ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0)
04:41:56 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
seccomp(0x0, 0x0, &(0x7f0000000040))
getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000280)={@local}, &(0x7f00000002c0)=0x14)
04:41:56 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000000c0)=ANY=[])
04:41:56 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc)
init_module(&(0x7f0000000500)='posix_acl_accessself\x00', 0x15, &(0x7f0000000580)='$,\x00')
04:41:56 executing program 6:
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
setuid(0x0)
04:41:56 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]})
socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000100))
ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0)
04:41:57 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]})
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080)=0xffffffffffffff52, 0x0)
ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0)
04:41:57 executing program 6:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
setuid(0x0)
04:41:57 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000000c0)=ANY=[])
04:41:57 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc)
init_module(&(0x7f0000000500)='posix_acl_accessself\x00', 0x15, &(0x7f0000000580)='$,\x00')
04:41:57 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
seccomp(0x0, 0x0, &(0x7f0000000040))
getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000280)={@local}, &(0x7f00000002c0)=0x14)
04:41:57 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]})
socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000100))
ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0)
[ 663.430692] audit: type=1326 audit(1529728917.429:1068): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9007 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:57 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
getpgid(0x0)
04:41:57 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
prctl$setptracer(0x59616d61, 0x0)
ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000140))
[ 663.505936] audit: type=1326 audit(1529728917.504:1069): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9016 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:57 executing program 6:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
setuid(0x0)
04:41:57 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc)
init_module(&(0x7f0000000500)='posix_acl_accessself\x00', 0x15, &(0x7f0000000580)='$,\x00')
04:41:57 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
seccomp(0x0, 0x0, &(0x7f0000000040))
getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000280)={@local}, &(0x7f00000002c0)=0x14)
04:41:57 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]})
socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000100))
ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0)
04:41:57 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc)
init_module(&(0x7f0000000500)='posix_acl_accessself\x00', 0x15, &(0x7f0000000580)='$,\x00')
04:41:57 executing program 6:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
setuid(0x0)
04:41:57 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
prctl$setptracer(0x59616d61, 0x0)
ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000140))
04:41:57 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000280)={@local}, &(0x7f00000002c0)=0x14)
04:41:58 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]})
accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080)=0xffffffffffffff52, 0x0)
ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0)
04:41:58 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc)
init_module(&(0x7f0000000500)='posix_acl_accessself\x00', 0x15, &(0x7f0000000580)='$,\x00')
04:41:58 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
setuid(0x0)
04:41:58 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
prctl$setptracer(0x59616d61, 0x0)
ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000140))
04:41:58 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000280)={@local}, &(0x7f00000002c0)=0x14)
04:41:58 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000000c0)=ANY=[])
04:41:58 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
getpgid(0x0)
04:41:58 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc)
init_module(&(0x7f0000000500)='posix_acl_accessself\x00', 0x15, &(0x7f0000000580)='$,\x00')
04:41:58 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
setuid(0x0)
04:41:58 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000280)={@local}, &(0x7f00000002c0)=0x14)
04:41:58 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
prctl$setptracer(0x59616d61, 0x0)
ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000140))
04:41:58 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]})
socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000100))
ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0)
04:41:58 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc)
init_module(&(0x7f0000000500)='posix_acl_accessself\x00', 0x15, &(0x7f0000000580)='$,\x00')
04:41:58 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
setuid(0x0)
04:41:58 executing program 3:
seccomp(0x0, 0x0, &(0x7f0000000040))
getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000280)={@local}, &(0x7f00000002c0)=0x14)
[ 664.764287] kauditd_printk_skb: 5 callbacks suppressed
[ 664.764309] audit: type=1326 audit(1529728918.762:1075): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9087 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:58 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000140))
[ 664.851565] audit: type=1326 audit(1529728918.800:1076): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9089 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:59 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000000c0)=ANY=[])
04:41:59 executing program 3:
seccomp(0x0, 0x0, &(0x7f0000000040))
getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000280)={@local}, &(0x7f00000002c0)=0x14)
04:41:59 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]})
add_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f0000000180), 0x0, 0xfffffffffffffffe)
keyctl$update(0x2, 0x0, &(0x7f00000001c0), 0x0)
04:41:59 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
setuid(0x0)
04:41:59 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000140))
04:41:59 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
socket$inet_tcp(0x2, 0x1, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f0000003400), 0x0, 0x0, &(0x7f0000003580))
[ 665.450193] audit: type=1326 audit(1529728919.448:1077): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9114 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:41:59 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
setuid(0x0)
04:41:59 executing program 3:
seccomp(0x0, 0x0, &(0x7f0000000040))
getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000280)={@local}, &(0x7f00000002c0)=0x14)
04:41:59 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000140))
04:41:59 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
setuid(0x0)
04:41:59 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240)='bridge0\x00', 0x10)
04:41:59 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]})
socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000100))
ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0)
04:41:59 executing program 3:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
seccomp(0x0, 0x0, &(0x7f0000000040))
getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000280)={@local}, &(0x7f00000002c0)=0x14)
04:41:59 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc)
init_module(&(0x7f0000000500)='posix_acl_accessself\x00', 0x15, &(0x7f0000000580)='$,\x00')
04:41:59 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
socket$inet_tcp(0x2, 0x1, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f0000003400), 0x0, 0x0, &(0x7f0000003580))
04:41:59 executing program 7:
prctl$setptracer(0x59616d61, 0x0)
ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000140))
[ 665.854544] audit: type=1326 audit(1529728919.853:1078): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9144 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
[ 665.984650] audit: type=1326 audit(1529728919.980:1079): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9147 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:00 executing program 3:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
seccomp(0x0, 0x0, &(0x7f0000000040))
getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000280)={@local}, &(0x7f00000002c0)=0x14)
04:42:00 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
setuid(0x0)
04:42:00 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
dup(0xffffffffffffffff)
setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000040), 0x4)
04:42:00 executing program 7:
prctl$setptracer(0x59616d61, 0x0)
ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000140))
04:42:00 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
init_module(&(0x7f0000000040)='vboxnet0\x00', 0x9, &(0x7f00000000c0)="2a776c616e30aa5c3a6d643573756d76626f786e6574306d696d655f74797065656d3000")
getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000100)={'broute\x00'}, &(0x7f0000000180)=0x78)
04:42:00 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
socket$inet_tcp(0x2, 0x1, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f0000003400), 0x0, 0x0, &(0x7f0000003580))
[ 666.377769] audit: type=1326 audit(1529728920.376:1080): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9166 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:00 executing program 3:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
seccomp(0x0, 0x0, &(0x7f0000000040))
getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000280)={@local}, &(0x7f00000002c0)=0x14)
04:42:00 executing program 7:
prctl$setptracer(0x59616d61, 0x0)
ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000140))
04:42:00 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
socket$inet_tcp(0x2, 0x1, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f0000003400), 0x0, 0x0, &(0x7f0000003580))
04:42:00 executing program 7:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
prctl$setptracer(0x59616d61, 0x0)
ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000140))
04:42:00 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
init_module(&(0x7f0000000040)='vboxnet0\x00', 0x9, &(0x7f00000000c0)="2a776c616e30aa5c3a6d643573756d76626f786e6574306d696d655f74797065656d3000")
getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000100)={'broute\x00'}, &(0x7f0000000180)=0x78)
04:42:00 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc)
init_module(&(0x7f0000000500)='posix_acl_accessself\x00', 0x15, &(0x7f0000000580)='$,\x00')
04:42:00 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)})
seccomp(0x0, 0x0, &(0x7f0000000040))
getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000280)={@local}, &(0x7f00000002c0)=0x14)
04:42:00 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0)
04:42:00 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
recvmmsg(0xffffffffffffffff, &(0x7f0000003400), 0x0, 0x0, &(0x7f0000003580))
04:42:00 executing program 7:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
prctl$setptracer(0x59616d61, 0x0)
ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000140))
04:42:00 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]})
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000001c0)})
openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0)
[ 666.828688] audit: type=1326 audit(1529728920.827:1081): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9199 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:01 executing program 7:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
prctl$setptracer(0x59616d61, 0x0)
ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000140))
04:42:01 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0)
04:42:01 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
setuid(0x0)
04:42:01 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
init_module(&(0x7f0000000040)='vboxnet0\x00', 0x9, &(0x7f00000000c0)="2a776c616e30aa5c3a6d643573756d76626f786e6574306d696d655f74797065656d3000")
getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000100)={'broute\x00'}, &(0x7f0000000180)=0x78)
04:42:01 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
socket$inet_tcp(0x2, 0x1, 0x0)
fdatasync(0xffffffffffffffff)
04:42:01 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
recvmmsg(0xffffffffffffffff, &(0x7f0000003400), 0x0, 0x0, &(0x7f0000003580))
04:42:01 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)})
seccomp(0x0, 0x0, &(0x7f0000000040))
getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000280)={@local}, &(0x7f00000002c0)=0x14)
04:42:01 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)})
seccomp(0x0, 0x0, &(0x7f0000000040))
getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000280)={@local}, &(0x7f00000002c0)=0x14)
[ 667.360430] audit: type=1326 audit(1529728921.359:1082): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9234 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:01 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
prctl$setptracer(0x59616d61, 0x0)
ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000140))
04:42:01 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
init_module(&(0x7f0000000040)='vboxnet0\x00', 0x9, &(0x7f00000000c0)="2a776c616e30aa5c3a6d643573756d76626f786e6574306d696d655f74797065656d3000")
getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000100)={'broute\x00'}, &(0x7f0000000180)=0x78)
04:42:01 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
socket$inet_tcp(0x2, 0x1, 0x0)
fdatasync(0xffffffffffffffff)
04:42:01 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
recvmmsg(0xffffffffffffffff, &(0x7f0000003400), 0x0, 0x0, &(0x7f0000003580))
04:42:01 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0)
04:42:01 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]})
seccomp(0x0, 0x0, &(0x7f0000000040))
getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000280)={@local}, &(0x7f00000002c0)=0x14)
04:42:01 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000100)={'broute\x00'}, &(0x7f0000000180)=0x78)
04:42:01 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
prctl$setptracer(0x59616d61, 0x0)
ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000140))
04:42:01 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x0)
04:42:02 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
setuid(0x0)
04:42:02 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]})
seccomp(0x0, 0x0, &(0x7f0000000040))
getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000280)={@local}, &(0x7f00000002c0)=0x14)
04:42:02 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
prctl$setptracer(0x59616d61, 0x0)
ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000140))
04:42:02 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000100)={'broute\x00'}, &(0x7f0000000180)=0x78)
04:42:02 executing program 4:
socket$inet_tcp(0x2, 0x1, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f0000003400), 0x0, 0x0, &(0x7f0000003580))
04:42:02 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0)
04:42:02 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
socket$inet_tcp(0x2, 0x1, 0x0)
fdatasync(0xffffffffffffffff)
04:42:02 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x0)
[ 668.276906] audit: type=1326 audit(1529728922.274:1083): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9277 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:02 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]})
seccomp(0x0, 0x0, &(0x7f0000000040))
getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000280)={@local}, &(0x7f00000002c0)=0x14)
04:42:02 executing program 4:
socket$inet_tcp(0x2, 0x1, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f0000003400), 0x0, 0x0, &(0x7f0000003580))
04:42:02 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
prctl$setptracer(0x59616d61, 0x0)
ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000140))
04:42:02 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
socket$inet_tcp(0x2, 0x1, 0x0)
fdatasync(0xffffffffffffffff)
04:42:02 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x0)
04:42:02 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0)
04:42:02 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000100)={'broute\x00'}, &(0x7f0000000180)=0x78)
04:42:02 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
prctl$setptracer(0x59616d61, 0x0)
ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000140))
04:42:03 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
prctl$setptracer(0x59616d61, 0x0)
ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000140))
04:42:03 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]})
seccomp(0x0, 0x0, &(0x7f0000000040))
getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000280)={@local}, &(0x7f00000002c0)=0x14)
04:42:03 executing program 4:
socket$inet_tcp(0x2, 0x1, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f0000003400), 0x0, 0x0, &(0x7f0000003580))
04:42:03 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x0)
04:42:03 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
fgetxattr(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)=""/47, 0x2f)
04:42:03 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0)
04:42:03 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
fdatasync(0xffffffffffffffff)
04:42:03 executing program 0:
init_module(&(0x7f0000000040)='vboxnet0\x00', 0x9, &(0x7f00000000c0)="2a776c616e30aa5c3a6d643573756d76626f786e6574306d696d655f74797065656d3000")
getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000100)={'broute\x00'}, &(0x7f0000000180)=0x78)
[ 669.237977] audit: type=1326 audit(1529728923.236:1084): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9333 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:03 executing program 0:
init_module(&(0x7f0000000040)='vboxnet0\x00', 0x9, &(0x7f00000000c0)="2a776c616e30aa5c3a6d643573756d76626f786e6574306d696d655f74797065656d3000")
getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000100)={'broute\x00'}, &(0x7f0000000180)=0x78)
04:42:03 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
prctl$setptracer(0x59616d61, 0x0)
ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000140))
04:42:03 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
fdatasync(0xffffffffffffffff)
04:42:03 executing program 4:
seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
socket$inet_tcp(0x2, 0x1, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f0000003400), 0x0, 0x0, &(0x7f0000003580))
04:42:03 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0)
04:42:03 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x0)
04:42:03 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
fgetxattr(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)=""/47, 0x2f)
04:42:03 executing program 0:
init_module(&(0x7f0000000040)='vboxnet0\x00', 0x9, &(0x7f00000000c0)="2a776c616e30aa5c3a6d643573756d76626f786e6574306d696d655f74797065656d3000")
getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000100)={'broute\x00'}, &(0x7f0000000180)=0x78)
04:42:03 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
fdatasync(0xffffffffffffffff)
04:42:04 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]})
seccomp(0x0, 0x0, &(0x7f0000000040))
getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000280)={@local}, &(0x7f00000002c0)=0x14)
04:42:04 executing program 4:
seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
socket$inet_tcp(0x2, 0x1, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f0000003400), 0x0, 0x0, &(0x7f0000003580))
04:42:04 executing program 5:
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0)
04:42:04 executing program 2:
socket$inet_tcp(0x2, 0x1, 0x0)
fdatasync(0xffffffffffffffff)
04:42:04 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x0)
04:42:04 executing program 0:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
init_module(&(0x7f0000000040)='vboxnet0\x00', 0x9, &(0x7f00000000c0)="2a776c616e30aa5c3a6d643573756d76626f786e6574306d696d655f74797065656d3000")
getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000100)={'broute\x00'}, &(0x7f0000000180)=0x78)
04:42:04 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
fgetxattr(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)=""/47, 0x2f)
[ 670.158169] kauditd_printk_skb: 1 callbacks suppressed
[ 670.158190] audit: type=1326 audit(1529728924.156:1086): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9378 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:04 executing program 2:
socket$inet_tcp(0x2, 0x1, 0x0)
fdatasync(0xffffffffffffffff)
04:42:04 executing program 5:
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0)
04:42:04 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
prctl$setptracer(0x59616d61, 0x0)
ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000140))
04:42:04 executing program 4:
seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
socket$inet_tcp(0x2, 0x1, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f0000003400), 0x0, 0x0, &(0x7f0000003580))
04:42:04 executing program 2:
socket$inet_tcp(0x2, 0x1, 0x0)
fdatasync(0xffffffffffffffff)
04:42:04 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x0)
04:42:04 executing program 0:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
init_module(&(0x7f0000000040)='vboxnet0\x00', 0x9, &(0x7f00000000c0)="2a776c616e30aa5c3a6d643573756d76626f786e6574306d696d655f74797065656d3000")
getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000100)={'broute\x00'}, &(0x7f0000000180)=0x78)
04:42:04 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
fgetxattr(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)=""/47, 0x2f)
[ 670.508886] audit: type=1326 audit(1529728924.506:1087): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9416 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:04 executing program 2:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
socket$inet_tcp(0x2, 0x1, 0x0)
fdatasync(0xffffffffffffffff)
04:42:05 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]})
seccomp(0x0, 0x0, &(0x7f0000000040))
getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000280)={@local}, &(0x7f00000002c0)=0x14)
04:42:05 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)})
socket$inet_tcp(0x2, 0x1, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f0000003400), 0x0, 0x0, &(0x7f0000003580))
04:42:05 executing program 0:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
init_module(&(0x7f0000000040)='vboxnet0\x00', 0x9, &(0x7f00000000c0)="2a776c616e30aa5c3a6d643573756d76626f786e6574306d696d655f74797065656d3000")
getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000100)={'broute\x00'}, &(0x7f0000000180)=0x78)
04:42:05 executing program 5:
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0)
04:42:05 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]})
fgetxattr(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)=""/47, 0x2f)
04:42:05 executing program 1:
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x0)
04:42:05 executing program 2:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
socket$inet_tcp(0x2, 0x1, 0x0)
fdatasync(0xffffffffffffffff)
[ 671.138600] audit: type=1326 audit(1529728925.137:1088): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9441 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:05 executing program 1:
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x0)
04:42:05 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)})
init_module(&(0x7f0000000040)='vboxnet0\x00', 0x9, &(0x7f00000000c0)="2a776c616e30aa5c3a6d643573756d76626f786e6574306d696d655f74797065656d3000")
getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000100)={'broute\x00'}, &(0x7f0000000180)=0x78)
04:42:05 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
prctl$setptracer(0x59616d61, 0x0)
ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000140))
04:42:05 executing program 5:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0)
04:42:05 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)})
socket$inet_tcp(0x2, 0x1, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f0000003400), 0x0, 0x0, &(0x7f0000003580))
04:42:05 executing program 2:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
socket$inet_tcp(0x2, 0x1, 0x0)
fdatasync(0xffffffffffffffff)
04:42:05 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]})
fgetxattr(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)=""/47, 0x2f)
04:42:05 executing program 1:
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x0)
04:42:05 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)})
init_module(&(0x7f0000000040)='vboxnet0\x00', 0x9, &(0x7f00000000c0)="2a776c616e30aa5c3a6d643573756d76626f786e6574306d696d655f74797065656d3000")
getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000100)={'broute\x00'}, &(0x7f0000000180)=0x78)
[ 671.478770] audit: type=1326 audit(1529728925.477:1089): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9467 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:06 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]})
fgetxattr(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)=""/47, 0x2f)
04:42:06 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)})
socket$inet_tcp(0x2, 0x1, 0x0)
fdatasync(0xffffffffffffffff)
04:42:06 executing program 5:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0)
04:42:06 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x0)
04:42:06 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)})
socket$inet_tcp(0x2, 0x1, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f0000003400), 0x0, 0x0, &(0x7f0000003580))
04:42:06 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)})
init_module(&(0x7f0000000040)='vboxnet0\x00', 0x9, &(0x7f00000000c0)="2a776c616e30aa5c3a6d643573756d76626f786e6574306d696d655f74797065656d3000")
getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000100)={'broute\x00'}, &(0x7f0000000180)=0x78)
04:42:06 executing program 3:
r0 = socket$inet6(0xa, 0x1, 0x0)
ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070")
r1 = socket(0x40000000002, 0x2000000000000003, 0x2)
r2 = socket$packet(0x11, 0x3, 0x300)
sendto$unix(r1, &(0x7f0000000180), 0x0, 0x0, &(0x7f0000000240)=@abs, 0x6e)
sendto$inet6(r2, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c)
04:42:06 executing program 5:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0)
04:42:06 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)})
socket$inet_tcp(0x2, 0x1, 0x0)
fdatasync(0xffffffffffffffff)
[ 672.142027] raw_sendmsg: syz-executor3 forgot to set AF_INET. Fix it!
04:42:06 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)})
socket$inet_tcp(0x2, 0x1, 0x0)
fdatasync(0xffffffffffffffff)
04:42:06 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x0)
04:42:06 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]})
init_module(&(0x7f0000000040)='vboxnet0\x00', 0x9, &(0x7f00000000c0)="2a776c616e30aa5c3a6d643573756d76626f786e6574306d696d655f74797065656d3000")
getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000100)={'broute\x00'}, &(0x7f0000000180)=0x78)
04:42:06 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]})
socket$inet_tcp(0x2, 0x1, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f0000003400), 0x0, 0x0, &(0x7f0000003580))
04:42:06 executing program 6:
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
fgetxattr(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)=""/47, 0x2f)
04:42:06 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0)
ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000))
04:42:06 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000080)})
getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000001c0), &(0x7f0000000200)=0x4)
04:42:06 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0)
04:42:06 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]})
socket$inet_tcp(0x2, 0x1, 0x0)
fdatasync(0xffffffffffffffff)
04:42:06 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0)
04:42:06 executing program 6:
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
fgetxattr(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)=""/47, 0x2f)
04:42:06 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x0)
04:42:06 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]})
init_module(&(0x7f0000000040)='vboxnet0\x00', 0x9, &(0x7f00000000c0)="2a776c616e30aa5c3a6d643573756d76626f786e6574306d696d655f74797065656d3000")
getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000100)={'broute\x00'}, &(0x7f0000000180)=0x78)
04:42:06 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]})
socket$inet_tcp(0x2, 0x1, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f0000003400), 0x0, 0x0, &(0x7f0000003580))
04:42:06 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000080)})
getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000001c0), &(0x7f0000000200)=0x4)
04:42:06 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0)
ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000))
04:42:06 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]})
socket$inet_tcp(0x2, 0x1, 0x0)
fdatasync(0xffffffffffffffff)
04:42:06 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x0)
04:42:06 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0)
04:42:06 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]})
init_module(&(0x7f0000000040)='vboxnet0\x00', 0x9, &(0x7f00000000c0)="2a776c616e30aa5c3a6d643573756d76626f786e6574306d696d655f74797065656d3000")
getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000100)={'broute\x00'}, &(0x7f0000000180)=0x78)
04:42:06 executing program 6:
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
fgetxattr(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)=""/47, 0x2f)
04:42:06 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]})
socket$inet_tcp(0x2, 0x1, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f0000003400), 0x0, 0x0, &(0x7f0000003580))
04:42:06 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000080)})
getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000001c0), &(0x7f0000000200)=0x4)
04:42:06 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]})
socket$inet_tcp(0x2, 0x1, 0x0)
fdatasync(0xffffffffffffffff)
04:42:07 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0)
ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000))
04:42:07 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]})
socket$inet_tcp(0x2, 0x1, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f0000003400), 0x0, 0x0, &(0x7f0000003580))
04:42:07 executing program 6:
seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
fgetxattr(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)=""/47, 0x2f)
04:42:07 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0)
04:42:07 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x0)
04:42:07 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]})
init_module(&(0x7f0000000040)='vboxnet0\x00', 0x9, &(0x7f00000000c0)="2a776c616e30aa5c3a6d643573756d76626f786e6574306d696d655f74797065656d3000")
getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000100)={'broute\x00'}, &(0x7f0000000180)=0x78)
[ 673.194394] audit: type=1326 audit(1529728927.183:1090): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9584 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:07 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000080)})
getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000001c0), &(0x7f0000000200)=0x4)
04:42:07 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]})
socket$inet_tcp(0x2, 0x1, 0x0)
fdatasync(0xffffffffffffffff)
04:42:07 executing program 6:
seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
fgetxattr(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)=""/47, 0x2f)
[ 673.273136] audit: type=1326 audit(1529728927.218:1091): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9586 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:07 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x0)
04:42:07 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0)
[ 673.368722] audit: type=1326 audit(1529728927.357:1092): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9595 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:07 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0)
ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000))
04:42:07 executing program 6:
seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
fgetxattr(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)=""/47, 0x2f)
04:42:07 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000001c0), &(0x7f0000000200)=0x4)
04:42:07 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x0)
04:42:07 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0)
04:42:07 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000))
04:42:08 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]})
socket$inet_tcp(0x2, 0x1, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f0000003400), 0x0, 0x0, &(0x7f0000003580))
04:42:08 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x0)
04:42:08 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
fgetxattr(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)=""/47, 0x2f)
04:42:08 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]})
init_module(&(0x7f0000000040)='vboxnet0\x00', 0x9, &(0x7f00000000c0)="2a776c616e30aa5c3a6d643573756d76626f786e6574306d696d655f74797065656d3000")
getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000100)={'broute\x00'}, &(0x7f0000000180)=0x78)
04:42:08 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000001c0), &(0x7f0000000200)=0x4)
04:42:08 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0)
[ 674.155927] audit: type=1326 audit(1529728928.154:1093): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9636 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
[ 674.227155] audit: type=1326 audit(1529728928.195:1094): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9643 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
[ 674.247093] audit: type=1326 audit(1529728928.204:1095): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9641 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:08 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]})
socket$inet_tcp(0x2, 0x1, 0x0)
fdatasync(0xffffffffffffffff)
04:42:08 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000))
04:42:08 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
fgetxattr(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)=""/47, 0x2f)
04:42:08 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x0)
04:42:08 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000001c0), &(0x7f0000000200)=0x4)
04:42:08 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x0)
04:42:08 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
fgetxattr(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)=""/47, 0x2f)
04:42:08 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000))
04:42:08 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
fgetxattr(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)=""/47, 0x2f)
04:42:08 executing program 3:
seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000080)})
getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000001c0), &(0x7f0000000200)=0x4)
04:42:09 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]})
socket$inet_tcp(0x2, 0x1, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f0000003400), 0x0, 0x0, &(0x7f0000003580))
04:42:09 executing program 7:
openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0)
ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000))
04:42:09 executing program 3:
seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000080)})
getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000001c0), &(0x7f0000000200)=0x4)
04:42:09 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]})
init_module(&(0x7f0000000040)='vboxnet0\x00', 0x9, &(0x7f00000000c0)="2a776c616e30aa5c3a6d643573756d76626f786e6574306d696d655f74797065656d3000")
getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000100)={'broute\x00'}, &(0x7f0000000180)=0x78)
04:42:09 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
fgetxattr(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)=""/47, 0x2f)
04:42:09 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0)
[ 675.189863] kauditd_printk_skb: 3 callbacks suppressed
[ 675.189941] audit: type=1326 audit(1529728929.188:1099): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9692 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
[ 675.245281] audit: type=1326 audit(1529728929.243:1100): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9697 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:09 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]})
socket$inet_tcp(0x2, 0x1, 0x0)
fdatasync(0xffffffffffffffff)
04:42:09 executing program 3:
seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000080)})
getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000001c0), &(0x7f0000000200)=0x4)
04:42:09 executing program 7:
openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0)
ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000))
04:42:09 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
fgetxattr(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)=""/47, 0x2f)
04:42:09 executing program 7:
openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0)
ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000))
[ 675.355331] audit: type=1326 audit(1529728929.353:1101): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9708 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:09 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x0)
04:42:09 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
fgetxattr(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)=""/47, 0x2f)
04:42:09 executing program 3:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000080)})
getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000001c0), &(0x7f0000000200)=0x4)
04:42:09 executing program 7:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0)
ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000))
[ 675.520626] audit: type=1326 audit(1529728929.519:1102): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9718 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:09 executing program 3:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000080)})
getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000001c0), &(0x7f0000000200)=0x4)
[ 675.573772] audit: type=1326 audit(1529728929.565:1103): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9724 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:10 executing program 7:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0)
ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000))
04:42:10 executing program 3:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000080)})
getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000001c0), &(0x7f0000000200)=0x4)
04:42:10 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]})
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)})
socket$inet6_udplite(0xa, 0x2, 0x88)
04:42:10 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000080)})
getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000001c0), &(0x7f0000000200)=0x4)
04:42:10 executing program 0:
04:42:10 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0)
04:42:10 executing program 0:
04:42:10 executing program 7:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0)
ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000))
04:42:10 executing program 4:
04:42:10 executing program 2:
04:42:10 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000080)})
getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000001c0), &(0x7f0000000200)=0x4)
[ 676.264760] audit: type=1326 audit(1529728930.263:1104): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9750 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:10 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x0)
04:42:10 executing program 0:
04:42:10 executing program 4:
04:42:10 executing program 2:
04:42:10 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0)
ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000))
04:42:10 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000080)})
getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000001c0), &(0x7f0000000200)=0x4)
04:42:10 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
fgetxattr(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)=""/47, 0x2f)
04:42:10 executing program 4:
04:42:10 executing program 2:
[ 676.580852] audit: type=1326 audit(1529728930.579:1105): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9771 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:10 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000080)})
getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000001c0), &(0x7f0000000200)=0x4)
[ 676.669886] audit: type=1326 audit(1529728930.640:1106): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9781 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:11 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0)
ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000))
04:42:11 executing program 0:
04:42:11 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000080)})
getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000001c0), &(0x7f0000000200)=0x4)
04:42:11 executing program 4:
04:42:11 executing program 2:
04:42:11 executing program 5:
04:42:11 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
fgetxattr(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)=""/47, 0x2f)
04:42:11 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000080)})
getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000001c0), &(0x7f0000000200)=0x4)
04:42:11 executing program 0:
04:42:11 executing program 2:
04:42:11 executing program 4:
04:42:11 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0)
ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000))
04:42:11 executing program 5:
04:42:11 executing program 1:
[ 677.571135] audit: type=1326 audit(1529728931.569:1107): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9815 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:11 executing program 5:
04:42:11 executing program 4:
04:42:11 executing program 0:
04:42:11 executing program 1:
04:42:11 executing program 2:
04:42:11 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0)
ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000))
04:42:11 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000080)})
getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000001c0), &(0x7f0000000200)=0x4)
04:42:11 executing program 2:
[ 677.891617] audit: type=1326 audit(1529728931.887:1108): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9840 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:12 executing program 2:
04:42:12 executing program 0:
04:42:12 executing program 4:
04:42:12 executing program 1:
04:42:12 executing program 5:
04:42:12 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0)
ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000))
04:42:12 executing program 4:
04:42:12 executing program 2:
04:42:12 executing program 0:
04:42:12 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x1000000000000006, 0x0, 0x0, 0x502a1}]})
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20)
keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0)
04:42:12 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
syz_open_procfs(0x0, &(0x7f0000001e00)='loginuid\x00')
connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e)
04:42:12 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0)
ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000))
04:42:12 executing program 4:
04:42:12 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0)
ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000100))
04:42:12 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000080)})
getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000001c0), &(0x7f0000000200)=0x4)
04:42:12 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50353}]})
open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
syncfs(0xffffffffffffffff)
04:42:12 executing program 0:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0xd}, 0x1c)
04:42:12 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0)
ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000))
04:42:12 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x1000000000000006, 0x0, 0x0, 0x502a1}]})
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20)
keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0)
04:42:12 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
syz_open_procfs(0x0, &(0x7f0000001e00)='loginuid\x00')
connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e)
04:42:12 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x40000000050251}]})
socketpair(0x0, 0x0, 0x0, &(0x7f0000000340))
close(0xffffffffffffffff)
04:42:13 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0)
ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000100))
04:42:13 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50353}]})
open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
syncfs(0xffffffffffffffff)
04:42:13 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x1000000000000006, 0x0, 0x0, 0x502a1}]})
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20)
keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0)
04:42:13 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
syz_open_procfs(0x0, &(0x7f0000001e00)='loginuid\x00')
connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e)
04:42:13 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50353}]})
open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
syncfs(0xffffffffffffffff)
04:42:13 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0)
ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000100))
04:42:13 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x40000000050251}]})
socketpair(0x0, 0x0, 0x0, &(0x7f0000000340))
close(0xffffffffffffffff)
04:42:13 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x1000000000000006, 0x0, 0x0, 0x502a1}]})
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20)
keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0)
04:42:13 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50353}]})
open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
syncfs(0xffffffffffffffff)
04:42:13 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0)
ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000100))
04:42:13 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000080)})
getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000001c0), &(0x7f0000000200)=0x4)
04:42:13 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50353}]})
syncfs(0xffffffffffffffff)
04:42:13 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0)
ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000))
04:42:13 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x40000000050251}]})
socketpair(0x0, 0x0, 0x0, &(0x7f0000000340))
close(0xffffffffffffffff)
04:42:13 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x1000000000000006, 0x0, 0x0, 0x502a1}]})
keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0)
04:42:13 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
syz_open_procfs(0x0, &(0x7f0000001e00)='loginuid\x00')
connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e)
04:42:13 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50353}]})
syncfs(0xffffffffffffffff)
04:42:13 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000100))
04:42:13 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e)
04:42:13 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x40000000050251}]})
socketpair(0x0, 0x0, 0x0, &(0x7f0000000340))
close(0xffffffffffffffff)
04:42:14 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x1000000000000006, 0x0, 0x0, 0x502a1}]})
keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0)
04:42:14 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50353}]})
syncfs(0xffffffffffffffff)
04:42:14 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000100))
04:42:14 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e)
04:42:14 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x1000000000000006, 0x0, 0x0, 0x502a1}]})
keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0)
04:42:14 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x40000000050251}]})
close(0xffffffffffffffff)
04:42:14 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
setuid(0x0)
04:42:14 executing program 4:
open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
syncfs(0xffffffffffffffff)
[ 680.706738] kauditd_printk_skb: 4 callbacks suppressed
[ 680.706765] audit: type=1326 audit(1529728934.705:1113): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9991 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:14 executing program 1:
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20)
keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0)
04:42:14 executing program 4:
open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
syncfs(0xffffffffffffffff)
04:42:14 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x40000000050251}]})
close(0xffffffffffffffff)
04:42:14 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e)
04:42:14 executing program 3:
04:42:14 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0)
ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000))
04:42:14 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000100))
04:42:14 executing program 2:
openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0)
ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000100))
[ 680.865386] audit: type=1326 audit(1529728934.860:1114): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10009 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:14 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
modify_ldt$read(0x0, &(0x7f0000003340), 0x0)
openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
04:42:14 executing program 1:
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20)
keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0)
04:42:14 executing program 4:
open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
syncfs(0xffffffffffffffff)
04:42:15 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x40000000050251}]})
close(0xffffffffffffffff)
04:42:15 executing program 5:
syz_open_procfs(0x0, &(0x7f0000001e00)='loginuid\x00')
connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e)
04:42:15 executing program 2:
openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0)
ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000100))
04:42:15 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0)
fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000001780))
04:42:15 executing program 1:
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20)
keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0)
04:42:15 executing program 4:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50353}]})
open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
syncfs(0xffffffffffffffff)
04:42:15 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x1000000000000006, 0x0, 0x0, 0x502a1}]})
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20)
keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0)
04:42:15 executing program 5:
syz_open_procfs(0x0, &(0x7f0000001e00)='loginuid\x00')
connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e)
04:42:15 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]})
ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0)
ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f0000000100))
04:42:15 executing program 0:
socketpair(0x0, 0x0, 0x0, &(0x7f0000000340))
close(0xffffffffffffffff)
04:42:15 executing program 2:
openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0)
ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000100))
04:42:15 executing program 4:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50353}]})
open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
syncfs(0xffffffffffffffff)
04:42:15 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]})
openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0)
socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000380))
04:42:15 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0)
fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000001780))
04:42:15 executing program 4:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50353}]})
open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
syncfs(0xffffffffffffffff)
04:42:15 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]})
ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0)
ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f0000000100))
04:42:15 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x1000000000000006, 0x0, 0x0, 0x502a1}]})
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20)
keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0)
04:42:15 executing program 5:
syz_open_procfs(0x0, &(0x7f0000001e00)='loginuid\x00')
connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e)
04:42:15 executing program 2:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0)
ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000100))
04:42:16 executing program 0:
socketpair(0x0, 0x0, 0x0, &(0x7f0000000340))
close(0xffffffffffffffff)
04:42:16 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0)
fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000001780))
04:42:16 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]})
openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0)
socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000380))
04:42:16 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000040))
open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
syncfs(0xffffffffffffffff)
04:42:16 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]})
ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0)
ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f0000000100))
04:42:16 executing program 5:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
syz_open_procfs(0x0, &(0x7f0000001e00)='loginuid\x00')
connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e)
04:42:16 executing program 2:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0)
ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000100))
04:42:16 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x1000000000000006, 0x0, 0x0, 0x502a1}]})
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20)
keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0)
04:42:16 executing program 0:
socketpair(0x0, 0x0, 0x0, &(0x7f0000000340))
close(0xffffffffffffffff)
04:42:16 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]})
openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0)
socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000380))
04:42:16 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0)
fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000001780))
04:42:16 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000040))
open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
syncfs(0xffffffffffffffff)
04:42:16 executing program 5:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
syz_open_procfs(0x0, &(0x7f0000001e00)='loginuid\x00')
connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e)
04:42:16 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)})
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20)
keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0)
04:42:16 executing program 2:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0)
ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000100))
04:42:16 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]})
ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0)
ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f0000000100))
04:42:16 executing program 0:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x40000000050251}]})
socketpair(0x0, 0x0, 0x0, &(0x7f0000000340))
close(0xffffffffffffffff)
04:42:16 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000040))
open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
syncfs(0xffffffffffffffff)
04:42:16 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]})
openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0)
socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000380))
04:42:16 executing program 5:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
syz_open_procfs(0x0, &(0x7f0000001e00)='loginuid\x00')
connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e)
04:42:16 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0)
ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000100))
04:42:16 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000001780))
04:42:16 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)})
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20)
keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0)
04:42:16 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]})
ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f0000000100))
04:42:16 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0)
ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000100))
04:42:16 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
socket$inet6(0xa, 0x0, 0x0)
write$fuse(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @fuse_notify_store_out}, 0x28)
04:42:16 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50353}]})
open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
syncfs(0xffffffffffffffff)
04:42:16 executing program 0:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x40000000050251}]})
socketpair(0x0, 0x0, 0x0, &(0x7f0000000340))
close(0xffffffffffffffff)
04:42:16 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
syz_open_procfs(0x0, &(0x7f0000001e00)='loginuid\x00')
connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e)
04:42:17 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)})
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20)
keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0)
04:42:17 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000001780))
04:42:17 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]})
ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f0000000100))
04:42:17 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0)
ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000100))
04:42:17 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50353}]})
open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
syncfs(0xffffffffffffffff)
04:42:17 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
syz_open_procfs(0x0, &(0x7f0000001e00)='loginuid\x00')
connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e)
04:42:17 executing program 0:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x40000000050251}]})
socketpair(0x0, 0x0, 0x0, &(0x7f0000000340))
close(0xffffffffffffffff)
04:42:17 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000001780))
04:42:17 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
socket$inet6(0xa, 0x0, 0x0)
write$fuse(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @fuse_notify_store_out}, 0x28)
04:42:17 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x502a1}]})
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20)
keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0)
04:42:17 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0)
ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000100))
04:42:17 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]})
ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f0000000100))
04:42:17 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
syz_open_procfs(0x0, &(0x7f0000001e00)='loginuid\x00')
connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e)
04:42:17 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50353}]})
open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
syncfs(0xffffffffffffffff)
04:42:17 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)})
socketpair(0x0, 0x0, 0x0, &(0x7f0000000340))
close(0xffffffffffffffff)
04:42:17 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x502a1}]})
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20)
keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0)
04:42:17 executing program 6:
openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0)
fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000001780))
04:42:17 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
socket$inet6(0xa, 0x0, 0x0)
write$fuse(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @fuse_notify_store_out}, 0x28)
04:42:17 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]})
open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
syncfs(0xffffffffffffffff)
04:42:17 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0)
ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000100))
04:42:17 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
syz_open_procfs(0x0, &(0x7f0000001e00)='loginuid\x00')
connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e)
04:42:17 executing program 3:
ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0)
ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f0000000100))
04:42:17 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
socket$inet6(0xa, 0x0, 0x0)
write$fuse(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @fuse_notify_store_out}, 0x28)
04:42:17 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x502a1}]})
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20)
keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0)
04:42:17 executing program 6:
openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0)
fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000001780))
04:42:17 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)})
socketpair(0x0, 0x0, 0x0, &(0x7f0000000340))
close(0xffffffffffffffff)
[ 683.795223] audit: type=1326 audit(1529728937.793:1115): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10237 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:17 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0)
ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000100))
04:42:17 executing program 3:
ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0)
ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f0000000100))
04:42:18 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
syz_open_procfs(0x0, &(0x7f0000001e00)='loginuid\x00')
connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e)
04:42:18 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x1000000000000006}]})
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20)
keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0)
04:42:18 executing program 6:
openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0)
fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000001780))
04:42:18 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
write$fuse(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @fuse_notify_store_out}, 0x28)
04:42:18 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)})
socketpair(0x0, 0x0, 0x0, &(0x7f0000000340))
close(0xffffffffffffffff)
04:42:18 executing program 3:
ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0)
ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f0000000100))
[ 684.136668] audit: type=1326 audit(1529728938.135:1116): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10269 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:18 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]})
open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
syncfs(0xffffffffffffffff)
04:42:18 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0)
ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000100))
04:42:18 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
syz_open_procfs(0x0, &(0x7f0000001e00)='loginuid\x00')
connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e)
04:42:18 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
write$fuse(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @fuse_notify_store_out}, 0x28)
04:42:18 executing program 6:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0)
fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000001780))
04:42:18 executing program 3:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]})
ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0)
ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f0000000100))
04:42:18 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x40000000050251}]})
socketpair(0x0, 0x0, 0x0, &(0x7f0000000340))
close(0xffffffffffffffff)
[ 684.725995] audit: type=1326 audit(1529728938.724:1117): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10296 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:18 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
syz_open_procfs(0x0, &(0x7f0000001e00)='loginuid\x00')
connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e)
04:42:18 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x40000000050251}]})
socketpair(0x0, 0x0, 0x0, &(0x7f0000000340))
close(0xffffffffffffffff)
04:42:18 executing program 6:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0)
fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000001780))
04:42:18 executing program 3:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]})
ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0)
ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f0000000100))
[ 684.815439] audit: type=1326 audit(1529728938.767:1118): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10302 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
[ 684.933113] audit: type=1326 audit(1529728938.901:1119): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10307 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:19 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x1000000000000006}]})
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20)
keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0)
04:42:19 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
write$fuse(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @fuse_notify_store_out}, 0x28)
04:42:19 executing program 3:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]})
ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0)
ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f0000000100))
04:42:19 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x40000000050251}]})
socketpair(0x0, 0x0, 0x0, &(0x7f0000000340))
close(0xffffffffffffffff)
04:42:19 executing program 6:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0)
fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000001780))
[ 685.169606] audit: type=1326 audit(1529728939.167:1120): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10334 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:19 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]})
open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
syncfs(0xffffffffffffffff)
04:42:19 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040))
ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0)
ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f0000000100))
04:42:19 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]})
socketpair(0x0, 0x0, 0x0, &(0x7f0000000340))
close(0xffffffffffffffff)
04:42:19 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)})
openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0)
fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000001780))
04:42:19 executing program 7:
socket$inet6(0xa, 0x0, 0x0)
write$fuse(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @fuse_notify_store_out}, 0x28)
04:42:19 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0)
ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000100))
[ 685.708596] audit: type=1326 audit(1529728939.707:1121): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10350 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:19 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040))
ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0)
ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f0000000100))
04:42:19 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
syz_open_procfs(0x0, &(0x7f0000001e00)='loginuid\x00')
connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e)
[ 685.747623] audit: type=1326 audit(1529728939.730:1122): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10346 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
[ 685.782764] audit: type=1326 audit(1529728939.766:1123): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10348 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:19 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)})
openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0)
fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000001780))
04:42:19 executing program 7:
socket$inet6(0xa, 0x0, 0x0)
write$fuse(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @fuse_notify_store_out}, 0x28)
04:42:19 executing program 7:
socket$inet6(0xa, 0x0, 0x0)
write$fuse(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @fuse_notify_store_out}, 0x28)
[ 685.928222] audit: type=1326 audit(1529728939.926:1124): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10367 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:20 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x1000000000000006}]})
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20)
keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0)
04:42:20 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040))
ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0)
ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f0000000100))
04:42:20 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)})
openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0)
fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000001780))
04:42:20 executing program 7:
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
socket$inet6(0xa, 0x0, 0x0)
write$fuse(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @fuse_notify_store_out}, 0x28)
04:42:20 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50358}]})
ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0)
ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f0000000100))
[ 686.153237] audit: type=1326 audit(1529728940.151:1125): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10389 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:20 executing program 7:
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
socket$inet6(0xa, 0x0, 0x0)
write$fuse(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @fuse_notify_store_out}, 0x28)
04:42:20 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50358}]})
ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0)
ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f0000000100))
04:42:20 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]})
socketpair(0x0, 0x0, 0x0, &(0x7f0000000340))
close(0xffffffffffffffff)
04:42:20 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022d}]})
openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0)
fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000001780))
04:42:20 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000300))
sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0)
04:42:20 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0)
ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000100))
04:42:20 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50358}]})
ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0)
ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f0000000100))
[ 686.747495] audit: type=1326 audit(1529728940.746:1126): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10414 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:20 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
syz_open_procfs(0x0, &(0x7f0000001e00)='loginuid\x00')
connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e)
04:42:20 executing program 7:
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
socket$inet6(0xa, 0x0, 0x0)
write$fuse(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @fuse_notify_store_out}, 0x28)
04:42:20 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022d}]})
openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0)
fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000001780))
04:42:20 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]})
ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0)
ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f0000000100))
[ 686.834329] audit: type=1326 audit(1529728940.816:1127): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10422 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
[ 686.948732] audit: type=1326 audit(1529728940.941:1128): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10434 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:21 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)})
socket$inet6(0xa, 0x0, 0x0)
write$fuse(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @fuse_notify_store_out}, 0x28)
04:42:21 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000300))
sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0)
04:42:21 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022d}]})
openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0)
fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000001780))
04:42:21 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050199}]})
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)})
ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000100))
[ 687.036126] audit: type=1326 audit(1529728941.030:1129): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10433 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:21 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]})
openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0)
fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000001780))
04:42:21 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)})
socket$inet6(0xa, 0x0, 0x0)
write$fuse(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @fuse_notify_store_out}, 0x28)
[ 687.214896] audit: type=1326 audit(1529728941.213:1130): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10454 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:21 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000300))
sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0)
04:42:21 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]})
socketpair(0x0, 0x0, 0x0, &(0x7f0000000340))
close(0xffffffffffffffff)
04:42:21 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050199}]})
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)})
ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000100))
04:42:21 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)})
socket$inet6(0xa, 0x0, 0x0)
write$fuse(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @fuse_notify_store_out}, 0x28)
04:42:21 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000300))
sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0)
04:42:21 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0)
setitimer(0x0, &(0x7f00000000c0)={{0x77359400}}, &(0x7f0000000100))
04:42:21 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]})
socket$inet6(0xa, 0x0, 0x0)
write$fuse(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @fuse_notify_store_out}, 0x28)
04:42:21 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050199}]})
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)})
ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000100))
04:42:21 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
socket$inet_tcp(0x2, 0x1, 0x0)
accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c, 0x0)
04:42:21 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]})
ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0)
ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f0000000100))
04:42:21 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0)
04:42:22 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0)
setitimer(0x0, &(0x7f00000000c0)={{0x77359400}}, &(0x7f0000000100))
04:42:22 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050199}]})
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)})
ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000100))
04:42:22 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]})
socket$inet6(0xa, 0x0, 0x0)
write$fuse(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @fuse_notify_store_out}, 0x28)
04:42:22 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]})
openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0)
fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000001780))
04:42:22 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
socket$inet_tcp(0x2, 0x1, 0x0)
accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c, 0x0)
04:42:22 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0)
04:42:22 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]})
socket$inet6(0xa, 0x0, 0x0)
write$fuse(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @fuse_notify_store_out}, 0x28)
04:42:22 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0)
setitimer(0x0, &(0x7f00000000c0)={{0x77359400}}, &(0x7f0000000100))
04:42:22 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050199}]})
ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000100))
04:42:22 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
socket$inet_tcp(0x2, 0x1, 0x0)
accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c, 0x0)
04:42:22 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0)
04:42:22 executing program 0:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0)
getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ff4000/0xb000)=nil, 0xb000}, &(0x7f0000000080)=0x10)
04:42:22 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050199}]})
ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000100))
04:42:22 executing program 4:
socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000300))
sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0)
04:42:22 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]})
ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0)
ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f0000000100))
04:42:22 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]})
socket$inet6(0xa, 0x0, 0x0)
write$fuse(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @fuse_notify_store_out}, 0x28)
04:42:22 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
socket$inet_tcp(0x2, 0x1, 0x0)
accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c, 0x0)
04:42:22 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0)
setitimer(0x0, &(0x7f00000000c0)={{0x77359400}}, &(0x7f0000000100))
04:42:22 executing program 0:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0)
getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ff4000/0xb000)=nil, 0xb000}, &(0x7f0000000080)=0x10)
04:42:23 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]})
openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0)
fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000001780))
04:42:23 executing program 4:
socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000300))
sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0)
04:42:23 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050199}]})
ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000100))
04:42:23 executing program 0:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0)
getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ff4000/0xb000)=nil, 0xb000}, &(0x7f0000000080)=0x10)
04:42:23 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c, 0x0)
04:42:23 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
setitimer(0x0, &(0x7f00000000c0)={{0x77359400}}, &(0x7f0000000100))
04:42:23 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c, 0x0)
04:42:23 executing program 4:
socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000300))
sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0)
04:42:23 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
setitimer(0x0, &(0x7f00000000c0)={{0x77359400}}, &(0x7f0000000100))
04:42:23 executing program 1:
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)})
ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000100))
04:42:23 executing program 0:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0)
getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ff4000/0xb000)=nil, 0xb000}, &(0x7f0000000080)=0x10)
04:42:23 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]})
socket$inet6(0xa, 0x0, 0x0)
write$fuse(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @fuse_notify_store_out}, 0x28)
04:42:23 executing program 4:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000300))
sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0)
04:42:23 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c, 0x0)
04:42:23 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
setitimer(0x0, &(0x7f00000000c0)={{0x77359400}}, &(0x7f0000000100))
04:42:23 executing program 1:
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)})
ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000100))
04:42:24 executing program 2:
openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0)
setitimer(0x0, &(0x7f00000000c0)={{0x77359400}}, &(0x7f0000000100))
04:42:24 executing program 0:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ff4000/0xb000)=nil, 0xb000}, &(0x7f0000000080)=0x10)
04:42:24 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0)
04:42:24 executing program 4:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000300))
sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0)
04:42:24 executing program 1:
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)})
ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000100))
04:42:24 executing program 5:
socket$inet_tcp(0x2, 0x1, 0x0)
accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c, 0x0)
04:42:24 executing program 6:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
socket$inet6(0xa, 0x0, 0x0)
ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000140))
04:42:24 executing program 5:
socket$inet_tcp(0x2, 0x1, 0x0)
accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c, 0x0)
04:42:24 executing program 4:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000300))
sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0)
04:42:24 executing program 2:
openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0)
setitimer(0x0, &(0x7f00000000c0)={{0x77359400}}, &(0x7f0000000100))
04:42:24 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050199}]})
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)})
ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000100))
04:42:24 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]})
socket$inet6(0xa, 0x0, 0x0)
write$fuse(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @fuse_notify_store_out}, 0x28)
04:42:24 executing program 0:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ff4000/0xb000)=nil, 0xb000}, &(0x7f0000000080)=0x10)
04:42:24 executing program 5:
socket$inet_tcp(0x2, 0x1, 0x0)
accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c, 0x0)
04:42:24 executing program 6:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
socket$inet6(0xa, 0x0, 0x0)
ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000140))
04:42:24 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0)
04:42:24 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050199}]})
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)})
ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000100))
04:42:24 executing program 2:
openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0)
setitimer(0x0, &(0x7f00000000c0)={{0x77359400}}, &(0x7f0000000100))
04:42:24 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)})
socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000300))
sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0)
[ 690.924546] kauditd_printk_skb: 7 callbacks suppressed
[ 690.924569] audit: type=1326 audit(1529728944.920:1138): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10674 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:25 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050199}]})
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)})
ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000100))
04:42:25 executing program 2:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0)
setitimer(0x0, &(0x7f00000000c0)={{0x77359400}}, &(0x7f0000000100))
04:42:25 executing program 0:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ff4000/0xb000)=nil, 0xb000}, &(0x7f0000000080)=0x10)
04:42:25 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)})
socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000300))
sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0)
04:42:25 executing program 5:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
socket$inet_tcp(0x2, 0x1, 0x0)
accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c, 0x0)
04:42:25 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0)
04:42:25 executing program 6:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
socket$inet6(0xa, 0x0, 0x0)
ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000140))
04:42:25 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)})
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)})
ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000100))
04:42:25 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)})
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)})
ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000100))
04:42:25 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)})
socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000300))
sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0)
04:42:25 executing program 2:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0)
setitimer(0x0, &(0x7f00000000c0)={{0x77359400}}, &(0x7f0000000100))
04:42:25 executing program 5:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
socket$inet_tcp(0x2, 0x1, 0x0)
accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c, 0x0)
04:42:25 executing program 0:
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0)
getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ff4000/0xb000)=nil, 0xb000}, &(0x7f0000000080)=0x10)
04:42:25 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0)
04:42:25 executing program 6:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
socket$inet6(0xa, 0x0, 0x0)
ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000140))
04:42:25 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50357}]})
ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f00000000c0))
ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000180)={0x0, &(0x7f0000000100)})
04:42:25 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022d}]})
socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000300))
sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0)
04:42:25 executing program 5:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
socket$inet_tcp(0x2, 0x1, 0x0)
accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c, 0x0)
04:42:25 executing program 2:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0)
setitimer(0x0, &(0x7f00000000c0)={{0x77359400}}, &(0x7f0000000100))
04:42:25 executing program 0:
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0)
getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ff4000/0xb000)=nil, 0xb000}, &(0x7f0000000080)=0x10)
04:42:25 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)})
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)})
ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000100))
04:42:26 executing program 6:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000140))
04:42:26 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0)
04:42:26 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50357}]})
ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f00000000c0))
ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000180)={0x0, &(0x7f0000000100)})
04:42:26 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0)
setitimer(0x0, &(0x7f00000000c0)={{0x77359400}}, &(0x7f0000000100))
04:42:26 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050199}]})
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)})
ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000100))
04:42:26 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022d}]})
socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000300))
sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0)
04:42:26 executing program 0:
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0)
getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ff4000/0xb000)=nil, 0xb000}, &(0x7f0000000080)=0x10)
04:42:26 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)})
socket$inet_tcp(0x2, 0x1, 0x0)
accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c, 0x0)
04:42:26 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0)
04:42:26 executing program 6:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000140))
04:42:26 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50357}]})
ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f00000000c0))
ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000180)={0x0, &(0x7f0000000100)})
04:42:26 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0)
setitimer(0x0, &(0x7f00000000c0)={{0x77359400}}, &(0x7f0000000100))
04:42:26 executing program 0:
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0)
getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ff4000/0xb000)=nil, 0xb000}, &(0x7f0000000080)=0x10)
04:42:26 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)})
socket$inet_tcp(0x2, 0x1, 0x0)
accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c, 0x0)
04:42:26 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050199}]})
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)})
ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000100))
04:42:26 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022d}]})
socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000300))
sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0)
04:42:26 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0)
04:42:26 executing program 6:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000140))
04:42:26 executing program 0:
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0)
getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ff4000/0xb000)=nil, 0xb000}, &(0x7f0000000080)=0x10)
04:42:26 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)})
openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0)
setitimer(0x0, &(0x7f00000000c0)={{0x77359400}}, &(0x7f0000000100))
04:42:26 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]})
socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000300))
sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0)
04:42:26 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)})
socket$inet_tcp(0x2, 0x1, 0x0)
accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c, 0x0)
04:42:26 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50357}]})
ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f00000000c0))
ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000180)={0x0, &(0x7f0000000100)})
04:42:26 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050199}]})
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)})
ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000100))
[ 692.795890] audit: type=1326 audit(1529728946.794:1139): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10805 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:26 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]})
socket$inet_tcp(0x2, 0x1, 0x0)
accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c, 0x0)
04:42:26 executing program 0:
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0)
getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ff4000/0xb000)=nil, 0xb000}, &(0x7f0000000080)=0x10)
04:42:26 executing program 3:
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0)
04:42:26 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0)
setitimer(0x0, &(0x7f00000000c0)={{0x77359400}}, &(0x7f0000000100))
04:42:27 executing program 6:
socket$inet6(0xa, 0x0, 0x0)
ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000140))
04:42:27 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]})
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)})
ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000100))
04:42:27 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50357}]})
ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000180)={0x0, &(0x7f0000000100)})
[ 693.130166] audit: type=1326 audit(1529728947.128:1140): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10835 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:27 executing program 3:
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0)
04:42:27 executing program 0:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0)
getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ff4000/0xb000)=nil, 0xb000}, &(0x7f0000000080)=0x10)
04:42:27 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0)
setitimer(0x0, &(0x7f00000000c0)={{0x77359400}}, &(0x7f0000000100))
04:42:27 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]})
socket$inet_tcp(0x2, 0x1, 0x0)
accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c, 0x0)
04:42:27 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50357}]})
ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000180)={0x0, &(0x7f0000000100)})
04:42:27 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]})
socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000300))
sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0)
04:42:27 executing program 6:
socket$inet6(0xa, 0x0, 0x0)
ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000140))
04:42:27 executing program 3:
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0)
04:42:27 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]})
openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0)
setitimer(0x0, &(0x7f00000000c0)={{0x77359400}}, &(0x7f0000000100))
04:42:27 executing program 0:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0)
getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ff4000/0xb000)=nil, 0xb000}, &(0x7f0000000080)=0x10)
04:42:27 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]})
socket$inet_tcp(0x2, 0x1, 0x0)
accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c, 0x0)
04:42:27 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50357}]})
ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000180)={0x0, &(0x7f0000000100)})
04:42:27 executing program 3:
seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0)
[ 693.782596] audit: type=1326 audit(1529728947.780:1141): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10875 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:27 executing program 0:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0)
getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ff4000/0xb000)=nil, 0xb000}, &(0x7f0000000080)=0x10)
04:42:28 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]})
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)})
ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000100))
04:42:28 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0)
setitimer(0x0, &(0x7f00000000c0)={{0x77359400}}, &(0x7f0000000100))
04:42:28 executing program 6:
socket$inet6(0xa, 0x0, 0x0)
ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000140))
04:42:28 executing program 7:
ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f00000000c0))
ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000180)={0x0, &(0x7f0000000100)})
04:42:28 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]})
socket$inet_tcp(0x2, 0x1, 0x0)
accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c, 0x0)
04:42:28 executing program 3:
seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0)
04:42:28 executing program 0:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0)
getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ff4000/0xb000)=nil, 0xb000}, &(0x7f0000000080)=0x10)
[ 694.069344] audit: type=1326 audit(1529728948.068:1142): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10899 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
[ 694.128304] audit: type=1326 audit(1529728948.089:1143): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10900 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
[ 694.148471] audit: type=1326 audit(1529728948.112:1144): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10903 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:28 executing program 6:
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
socket$inet6(0xa, 0x0, 0x0)
ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000140))
04:42:28 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]})
socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000300))
sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0)
04:42:28 executing program 7:
ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f00000000c0))
ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000180)={0x0, &(0x7f0000000100)})
04:42:28 executing program 0:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0)
getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ff4000/0xb000)=nil, 0xb000}, &(0x7f0000000080)=0x10)
04:42:28 executing program 3:
seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0)
04:42:28 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0)
[ 694.742112] audit: type=1326 audit(1529728948.740:1145): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10923 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:28 executing program 0:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0)
getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ff4000/0xb000)=nil, 0xb000}, &(0x7f0000000080)=0x10)
04:42:28 executing program 7:
ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f00000000c0))
ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000180)={0x0, &(0x7f0000000100)})
04:42:28 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0)
04:42:29 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]})
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)})
ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000100))
04:42:29 executing program 6:
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
socket$inet6(0xa, 0x0, 0x0)
ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000140))
04:42:29 executing program 0:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0)
getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ff4000/0xb000)=nil, 0xb000}, &(0x7f0000000080)=0x10)
04:42:29 executing program 7:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50357}]})
ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f00000000c0))
ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000180)={0x0, &(0x7f0000000100)})
04:42:29 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0)
setitimer(0x0, &(0x7f00000000c0)={{0x77359400}}, &(0x7f0000000100))
04:42:29 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]})
socket$inet_tcp(0x2, 0x1, 0x0)
accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c, 0x0)
04:42:29 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0)
[ 695.108165] audit: type=1326 audit(1529728949.106:1146): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10948 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:29 executing program 7:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50357}]})
ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f00000000c0))
ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000180)={0x0, &(0x7f0000000100)})
[ 695.163761] audit: type=1326 audit(1529728949.145:1147): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10950 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:29 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0)
04:42:29 executing program 6:
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
socket$inet6(0xa, 0x0, 0x0)
ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000140))
04:42:29 executing program 7:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50357}]})
ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f00000000c0))
ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000180)={0x0, &(0x7f0000000100)})
04:42:29 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]})
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
timer_delete(0x0)
04:42:29 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000300)})
ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f00000000c0))
ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000180)={0x0, &(0x7f0000000100)})
04:42:29 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0)
04:42:29 executing program 6:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)})
socket$inet6(0xa, 0x0, 0x0)
ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000140))
04:42:29 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000300)})
ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f00000000c0))
ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000180)={0x0, &(0x7f0000000100)})
04:42:30 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]})
socket$inet_tcp(0x2, 0x1, 0x0)
accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c, 0x0)
04:42:30 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]})
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
timer_delete(0x0)
04:42:30 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0)
04:42:30 executing program 6:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)})
socket$inet6(0xa, 0x0, 0x0)
ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000140))
04:42:30 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000300)})
ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f00000000c0))
ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000180)={0x0, &(0x7f0000000100)})
04:42:30 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]})
openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0)
setitimer(0x0, &(0x7f00000000c0)={{0x77359400}}, &(0x7f0000000100))
04:42:30 executing program 0:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0)
getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ff4000/0xb000)=nil, 0xb000}, &(0x7f0000000080)=0x10)
04:42:30 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]})
add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8)
socket$unix(0x1, 0x0, 0x0)
[ 696.142750] kauditd_printk_skb: 2 callbacks suppressed
[ 696.142772] audit: type=1326 audit(1529728950.141:1150): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11011 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:30 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x50357}]})
ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f00000000c0))
ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000180)={0x0, &(0x7f0000000100)})
04:42:30 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0)
04:42:30 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]})
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
timer_delete(0x0)
[ 696.234621] audit: type=1326 audit(1529728950.173:1151): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11008 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
[ 696.254481] audit: type=1326 audit(1529728950.179:1152): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11014 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:30 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x50357}]})
ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f00000000c0))
ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000180)={0x0, &(0x7f0000000100)})
04:42:30 executing program 6:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)})
socket$inet6(0xa, 0x0, 0x0)
ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000140))
04:42:30 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]})
add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8)
socket$unix(0x1, 0x0, 0x0)
[ 696.405422] audit: type=1326 audit(1529728950.351:1153): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11033 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:30 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]})
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
timer_delete(0x0)
04:42:30 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x50357}]})
ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f00000000c0))
ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000180)={0x0, &(0x7f0000000100)})
04:42:31 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6}]})
ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f00000000c0))
ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000180)={0x0, &(0x7f0000000100)})
04:42:31 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]})
timer_delete(0x0)
04:42:31 executing program 6:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]})
socket$inet6(0xa, 0x0, 0x0)
ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000140))
04:42:31 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]})
add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8)
socket$unix(0x1, 0x0, 0x0)
04:42:31 executing program 5:
syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140))
syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0)
[ 697.051756] audit: type=1326 audit(1529728951.050:1154): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11060 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:31 executing program 0:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0)
getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ff4000/0xb000)=nil, 0xb000}, &(0x7f0000000080)=0x10)
04:42:31 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0)
ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000300))
[ 697.164230] audit: type=1326 audit(1529728951.156:1155): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11076 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:31 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]})
timer_delete(0x0)
04:42:31 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]})
add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8)
socket$unix(0x1, 0x0, 0x0)
04:42:31 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0)
04:42:31 executing program 6:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]})
socket$inet6(0xa, 0x0, 0x0)
ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000140))
04:42:31 executing program 5:
syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140))
syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0)
04:42:31 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]})
timer_delete(0x0)
04:42:31 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0)
ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000300))
[ 697.436121] audit: type=1326 audit(1529728951.434:1156): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11092 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:31 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]})
socket$unix(0x1, 0x0, 0x0)
04:42:31 executing program 5:
syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140))
syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0)
04:42:31 executing program 4:
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
timer_delete(0x0)
04:42:31 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6}]})
ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f00000000c0))
ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000180)={0x0, &(0x7f0000000100)})
04:42:31 executing program 6:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]})
socket$inet6(0xa, 0x0, 0x0)
ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000140))
04:42:31 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0)
ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000300))
04:42:31 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]})
socket$unix(0x1, 0x0, 0x0)
[ 698.037511] audit: type=1326 audit(1529728952.036:1157): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11128 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:32 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0)
ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000300))
04:42:32 executing program 5:
syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140))
syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0)
04:42:32 executing program 4:
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
timer_delete(0x0)
04:42:32 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]})
socket$unix(0x1, 0x0, 0x0)
04:42:32 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]})
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4)
open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0)
04:42:32 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]})
ustat(0x0, &(0x7f00000000c0))
ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0)
04:42:32 executing program 6:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]})
socket$inet6(0xa, 0x0, 0x0)
ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000140))
04:42:32 executing program 4:
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
timer_delete(0x0)
04:42:32 executing program 1:
add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8)
socket$unix(0x1, 0x0, 0x0)
04:42:32 executing program 5:
syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0)
04:42:32 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000300))
[ 698.388832] audit: type=1326 audit(1529728952.387:1158): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11152 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:32 executing program 1:
add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8)
socket$unix(0x1, 0x0, 0x0)
[ 698.471200] audit: type=1326 audit(1529728952.432:1159): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11162 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:32 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6}]})
ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f00000000c0))
ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000180)={0x0, &(0x7f0000000100)})
04:42:32 executing program 4:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]})
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
timer_delete(0x0)
04:42:32 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000300))
04:42:32 executing program 5:
syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0)
04:42:32 executing program 1:
add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8)
socket$unix(0x1, 0x0, 0x0)
04:42:32 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]})
ustat(0x0, &(0x7f00000000c0))
ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0)
04:42:33 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]})
add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8)
socket$unix(0x1, 0x0, 0x0)
04:42:33 executing program 4:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]})
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
timer_delete(0x0)
04:42:33 executing program 6:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]})
socket$inet6(0xa, 0x0, 0x0)
ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000140))
04:42:33 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]})
add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8)
socket$unix(0x1, 0x0, 0x0)
04:42:33 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000300))
04:42:33 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]})
ustat(0x0, &(0x7f00000000c0))
ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0)
04:42:33 executing program 5:
syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0)
04:42:33 executing program 4:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]})
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
timer_delete(0x0)
04:42:33 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50234}]})
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0)
ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000140))
04:42:33 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)})
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
timer_delete(0x0)
04:42:33 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)})
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
timer_delete(0x0)
04:42:33 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]})
add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8)
socket$unix(0x1, 0x0, 0x0)
04:42:33 executing program 5:
syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0)
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140))
syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0)
04:42:33 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]})
ustat(0x0, &(0x7f00000000c0))
ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0)
04:42:33 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50234}]})
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0)
ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000140))
04:42:33 executing program 2:
mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0)
ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000300))
04:42:33 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]})
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
prctl$setendian(0x14, 0x0)
04:42:34 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000300)})
add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8)
socket$unix(0x1, 0x0, 0x0)
04:42:34 executing program 6:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]})
socket$inet6(0xa, 0x0, 0x0)
ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000140))
04:42:34 executing program 5:
syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0)
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140))
syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0)
04:42:34 executing program 2:
mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0)
ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000300))
04:42:34 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)})
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
timer_delete(0x0)
04:42:34 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]})
ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0)
04:42:34 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50234}]})
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0)
ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000140))
04:42:34 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000300)})
add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8)
socket$unix(0x1, 0x0, 0x0)
04:42:34 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]})
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
prctl$setendian(0x14, 0x0)
04:42:34 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]})
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
timer_delete(0x0)
04:42:34 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000300)})
add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8)
socket$unix(0x1, 0x0, 0x0)
04:42:34 executing program 5:
syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0)
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140))
syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0)
04:42:34 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50234}]})
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0)
ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000140))
04:42:34 executing program 2:
mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0)
ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000300))
04:42:34 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]})
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
prctl$setendian(0x14, 0x0)
04:42:34 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]})
ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0)
04:42:34 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]})
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
timer_delete(0x0)
04:42:35 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50234}]})
ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000140))
04:42:35 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x50351}]})
add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8)
socket$unix(0x1, 0x0, 0x0)
04:42:35 executing program 2:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0)
ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000300))
04:42:35 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140))
syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0)
04:42:35 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]})
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
timer_delete(0x0)
04:42:35 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]})
ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0)
04:42:35 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]})
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
prctl$setendian(0x14, 0x0)
04:42:35 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000040)={'veth1_to_bridge\x00', @ifru_data=&(0x7f0000000000)="f4cd6d76f3fb7e60272ce83605f0770b5c01a220d830f459485780f0e82f08b8"}})
04:42:35 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]})
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
timer_delete(0x0)
04:42:35 executing program 2:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0)
ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000300))
04:42:35 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x50351}]})
add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8)
socket$unix(0x1, 0x0, 0x0)
04:42:35 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140))
syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0)
04:42:35 executing program 0:
ustat(0x0, &(0x7f00000000c0))
ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0)
04:42:35 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50234}]})
ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000140))
04:42:35 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]})
prctl$setendian(0x14, 0x0)
[ 701.541834] kauditd_printk_skb: 3 callbacks suppressed
[ 701.541856] audit: type=1326 audit(1529728955.540:1163): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11322 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:35 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000040)={'veth1_to_bridge\x00', @ifru_data=&(0x7f0000000000)="f4cd6d76f3fb7e60272ce83605f0770b5c01a220d830f459485780f0e82f08b8"}})
04:42:35 executing program 0:
ustat(0x0, &(0x7f00000000c0))
ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0)
04:42:35 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x50351}]})
add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8)
socket$unix(0x1, 0x0, 0x0)
04:42:35 executing program 2:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0)
ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000300))
04:42:35 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]})
prctl$setendian(0x14, 0x0)
04:42:35 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50234}]})
ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000140))
04:42:35 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140))
syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0)
04:42:35 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000040)={'veth1_to_bridge\x00', @ifru_data=&(0x7f0000000000)="f4cd6d76f3fb7e60272ce83605f0770b5c01a220d830f459485780f0e82f08b8"}})
04:42:35 executing program 0:
ustat(0x0, &(0x7f00000000c0))
ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0)
04:42:36 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]})
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
timer_delete(0x0)
04:42:36 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0)
ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000300))
04:42:36 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6}]})
add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8)
socket$unix(0x1, 0x0, 0x0)
04:42:36 executing program 3:
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0)
ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000140))
04:42:36 executing program 5:
syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0)
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140))
syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0)
04:42:36 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]})
prctl$setendian(0x14, 0x0)
04:42:36 executing program 0:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]})
ustat(0x0, &(0x7f00000000c0))
ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0)
04:42:36 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0)
[ 702.461650] audit: type=1326 audit(1529728956.460:1164): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11382 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
[ 702.521826] audit: type=1326 audit(1529728956.513:1165): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11378 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:36 executing program 0:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]})
ustat(0x0, &(0x7f00000000c0))
ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0)
04:42:36 executing program 3:
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0)
ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000140))
04:42:36 executing program 5:
syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0)
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140))
syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0)
04:42:36 executing program 7:
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
prctl$setendian(0x14, 0x0)
04:42:36 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
socket$inet_tcp(0x2, 0x1, 0x0)
clock_gettime(0x0, &(0x7f0000000140))
04:42:36 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0)
ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000300))
04:42:36 executing program 7:
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
prctl$setendian(0x14, 0x0)
04:42:36 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
socket$inet_tcp(0x2, 0x1, 0x0)
clock_gettime(0x0, &(0x7f0000000140))
04:42:37 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]})
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
timer_delete(0x0)
04:42:37 executing program 3:
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0)
ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000140))
04:42:37 executing program 0:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]})
ustat(0x0, &(0x7f00000000c0))
ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0)
04:42:37 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6}]})
add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8)
socket$unix(0x1, 0x0, 0x0)
04:42:37 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0)
ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000300))
04:42:37 executing program 7:
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
prctl$setendian(0x14, 0x0)
04:42:37 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
pipe(&(0x7f0000000000))
fcntl$setflags(0xffffffffffffffff, 0x2, 0x0)
04:42:37 executing program 5:
syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0)
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140))
syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0)
[ 703.435580] audit: type=1326 audit(1529728957.434:1166): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11440 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:37 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000300)})
ustat(0x0, &(0x7f00000000c0))
ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0)
04:42:37 executing program 3:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50234}]})
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0)
ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000140))
04:42:37 executing program 7:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]})
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
prctl$setendian(0x14, 0x0)
04:42:37 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0)
ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000300))
04:42:37 executing program 5:
syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140))
syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0)
[ 703.534645] audit: type=1326 audit(1529728957.454:1167): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11442 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:37 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpu.stat\x00', 0x0, 0x0)
set_thread_area(&(0x7f0000000080))
04:42:37 executing program 3:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50234}]})
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0)
ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000140))
04:42:37 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000300)})
ustat(0x0, &(0x7f00000000c0))
ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0)
04:42:38 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000300)})
ustat(0x0, &(0x7f00000000c0))
ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0)
04:42:38 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0)
ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000300))
04:42:38 executing program 5:
syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140))
syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0)
04:42:38 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6}]})
add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8)
socket$unix(0x1, 0x0, 0x0)
04:42:38 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]})
seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f00000002c0)})
io_destroy(0x0)
04:42:38 executing program 3:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50234}]})
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0)
ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000140))
04:42:38 executing program 7:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]})
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
prctl$setendian(0x14, 0x0)
04:42:38 executing program 4:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
socket$inet6(0xa, 0x0, 0x0)
tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
04:42:38 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0)
ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000300))
04:42:38 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x50351}]})
ustat(0x0, &(0x7f00000000c0))
ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0)
04:42:38 executing program 5:
syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140))
syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0)
[ 704.475349] audit: type=1326 audit(1529728958.473:1168): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11491 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:38 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)})
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0)
ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000140))
04:42:38 executing program 7:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]})
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
prctl$setendian(0x14, 0x0)
04:42:38 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]})
seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f00000002c0)})
io_destroy(0x0)
04:42:38 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0)
ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000300))
04:42:38 executing program 5:
syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022d}]})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140))
syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0)
04:42:38 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)})
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0)
ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000140))
04:42:38 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x50351}]})
ustat(0x0, &(0x7f00000000c0))
ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0)
04:42:38 executing program 4:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
socket$inet6(0xa, 0x0, 0x0)
tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
[ 704.832759] audit: type=1326 audit(1529728958.831:1169): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11519 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:39 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x50351}]})
ustat(0x0, &(0x7f00000000c0))
ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0)
04:42:39 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)})
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
prctl$setendian(0x14, 0x0)
04:42:39 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]})
seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f00000002c0)})
io_destroy(0x0)
04:42:39 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]})
socket$nl_netfilter(0x10, 0x3, 0xc)
fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040))
04:42:39 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)})
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0)
ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000140))
04:42:39 executing program 5:
syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022d}]})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140))
syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0)
04:42:39 executing program 4:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
socket$inet6(0xa, 0x0, 0x0)
tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
04:42:39 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50234}]})
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0)
ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000140))
04:42:39 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6}]})
ustat(0x0, &(0x7f00000000c0))
ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0)
04:42:39 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)})
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
prctl$setendian(0x14, 0x0)
04:42:39 executing program 5:
syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022d}]})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140))
syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0)
[ 705.588171] audit: type=1326 audit(1529728959.586:1170): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11556 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:39 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0)
ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000300))
04:42:39 executing program 4:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
socket$inet6(0xa, 0x0, 0x0)
tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
04:42:39 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]})
socket$nl_netfilter(0x10, 0x3, 0xc)
fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040))
04:42:39 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]})
seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f00000002c0)})
io_destroy(0x0)
04:42:39 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50234}]})
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0)
ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000140))
04:42:39 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)})
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
prctl$setendian(0x14, 0x0)
04:42:39 executing program 5:
syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140))
syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0)
[ 705.806908] audit: type=1326 audit(1529728959.805:1171): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11579 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:39 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50234}]})
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0)
ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000140))
04:42:39 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]})
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
prctl$setendian(0x14, 0x0)
[ 705.862660] audit: type=1326 audit(1529728959.832:1172): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11581 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:39 executing program 4:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
04:42:39 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]})
io_destroy(0x0)
04:42:39 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]})
socket$nl_netfilter(0x10, 0x3, 0xc)
fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040))
04:42:40 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]})
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
prctl$setendian(0x14, 0x0)
04:42:40 executing program 4:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
04:42:40 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6}]})
ustat(0x0, &(0x7f00000000c0))
ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0)
04:42:40 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]})
io_destroy(0x0)
04:42:40 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0)
ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000300))
04:42:40 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]})
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0)
ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000140))
04:42:40 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]})
socket$nl_netfilter(0x10, 0x3, 0xc)
fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040))
04:42:40 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]})
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
prctl$setendian(0x14, 0x0)
04:42:40 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]})
io_destroy(0x0)
04:42:40 executing program 4:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
04:42:40 executing program 5:
syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140))
syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0)
[ 706.766150] kauditd_printk_skb: 1 callbacks suppressed
[ 706.766171] audit: type=1326 audit(1529728960.764:1174): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11623 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:40 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]})
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
prctl$setendian(0x14, 0x0)
04:42:40 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]})
fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040))
04:42:40 executing program 6:
seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f00000002c0)})
io_destroy(0x0)
[ 706.844498] audit: type=1326 audit(1529728960.802:1175): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11624 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
[ 706.864375] audit: type=1326 audit(1529728960.824:1176): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11635 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:41 executing program 4:
socket$inet6(0xa, 0x0, 0x0)
tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
[ 706.956098] audit: type=1326 audit(1529728960.954:1177): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11638 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:41 executing program 6:
seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f00000002c0)})
io_destroy(0x0)
04:42:41 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]})
fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040))
04:42:41 executing program 6:
seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f00000002c0)})
io_destroy(0x0)
04:42:41 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6}]})
ustat(0x0, &(0x7f00000000c0))
ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0)
04:42:41 executing program 4:
socket$inet6(0xa, 0x0, 0x0)
tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
[ 707.438871] audit: type=1326 audit(1529728961.437:1178): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11667 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:41 executing program 6:
seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]})
seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f00000002c0)})
io_destroy(0x0)
04:42:41 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]})
fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040))
04:42:41 executing program 4:
socket$inet6(0xa, 0x0, 0x0)
tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
04:42:41 executing program 5:
syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000140))
syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0)
04:42:41 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]})
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0)
ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000140))
04:42:41 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='status\x00')
clone(0x0, &(0x7f0000000240), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000001240))
[ 707.777819] audit: type=1326 audit(1529728961.776:1179): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11679 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:41 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]})
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
prctl$setendian(0x14, 0x0)
04:42:41 executing program 6:
seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]})
seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f00000002c0)})
io_destroy(0x0)
[ 707.833690] audit: type=1326 audit(1529728961.801:1180): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11683 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:41 executing program 1:
socket$nl_netfilter(0x10, 0x3, 0xc)
fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040))
04:42:41 executing program 4:
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
socket$inet6(0xa, 0x0, 0x0)
tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
[ 707.981378] audit: type=1326 audit(1529728961.980:1181): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11700 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:42 executing program 6:
seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]})
seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f00000002c0)})
io_destroy(0x0)
04:42:42 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='status\x00')
clone(0x0, &(0x7f0000000240), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000001240))
04:42:42 executing program 1:
socket$nl_netfilter(0x10, 0x3, 0xc)
fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040))
04:42:42 executing program 4:
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
socket$inet6(0xa, 0x0, 0x0)
tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
04:42:42 executing program 4:
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]})
socket$inet6(0xa, 0x0, 0x0)
tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
04:42:42 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)})
seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f00000002c0)})
io_destroy(0x0)
04:42:42 executing program 1:
socket$nl_netfilter(0x10, 0x3, 0xc)
fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040))
04:42:42 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='status\x00')
clone(0x0, &(0x7f0000000240), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000001240))
04:42:42 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]})
getpgrp(0xffffffffffffffff)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000040)}, 0x20)
04:42:42 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040))
mlockall(0x0)
04:42:42 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]})
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0)
ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000140))
04:42:42 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)})
seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f00000002c0)})
io_destroy(0x0)
[ 708.747987] audit: type=1326 audit(1529728962.746:1182): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11755 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:42 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]})
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100))
prctl$setendian(0x14, 0x0)
04:42:42 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]})
socket$nl_netfilter(0x10, 0x3, 0xc)
fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040))
04:42:42 executing program 4:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)})
socket$inet6(0xa, 0x0, 0x0)
tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
04:42:42 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='status\x00')
clone(0x0, &(0x7f0000000240), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000001240))
04:42:42 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5035a}]})
socket$nl_generic(0x10, 0x3, 0x10)
ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000140))
04:42:42 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)})
seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f00000002c0)})
io_destroy(0x0)
04:42:42 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040))
mlockall(0x0)
[ 708.924129] audit: type=1326 audit(1529728962.922:1183): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11771 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:42 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]})
socket$nl_netfilter(0x10, 0x3, 0xc)
fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040))
04:42:43 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50211}]})
seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f00000002c0)})
io_destroy(0x0)
04:42:43 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
clone(0x0, &(0x7f0000000240), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000001240))
04:42:43 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040))
mlockall(0x0)
04:42:43 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5035a}]})
socket$nl_generic(0x10, 0x3, 0x10)
ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000140))
04:42:43 executing program 4:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)})
socket$inet6(0xa, 0x0, 0x0)
tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
04:42:43 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]})
socket$nl_netfilter(0x10, 0x3, 0xc)
fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040))
04:42:43 executing program 4:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)})
socket$inet6(0xa, 0x0, 0x0)
tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
04:42:43 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50211}]})
seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f00000002c0)})
io_destroy(0x0)
04:42:43 executing program 4:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]})
socket$inet6(0xa, 0x0, 0x0)
tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
04:42:43 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040))
mlockall(0x0)
04:42:43 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
clone(0x0, &(0x7f0000000240), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000001240))
04:42:43 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000300)})
socket$nl_netfilter(0x10, 0x3, 0xc)
fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040))
04:42:43 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5035a}]})
socket$nl_generic(0x10, 0x3, 0x10)
ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000140))
04:42:43 executing program 7:
seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f3}]})
ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000))
recvmsg(0xffffffffffffff9c, &(0x7f0000000580)={&(0x7f00000000c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast1}}}, 0x80, &(0x7f0000000440), 0x0, &(0x7f00000004c0)=""/146, 0x92}, 0x0)
04:42:43 executing program 3:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000080))
04:42:43 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50211}]})
seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f00000002c0)})
io_destroy(0x0)
04:42:43 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000300)})
socket$nl_netfilter(0x10, 0x3, 0xc)
fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040))
04:42:44 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]})
seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f00000002c0)})
io_destroy(0x0)
04:42:44 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
clone(0x0, &(0x7f0000000240), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000001240))
04:42:44 executing program 4:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]})
socket$inet6(0xa, 0x0, 0x0)
tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
04:42:44 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
mlockall(0x0)
04:42:44 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5035a}]})
socket$nl_generic(0x10, 0x3, 0x10)
ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000140))
04:42:44 executing program 3:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000080))
04:42:44 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]})
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)})
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
04:42:44 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000300)})
socket$nl_netfilter(0x10, 0x3, 0xc)
fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040))
04:42:44 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
mlockall(0x0)
04:42:44 executing program 4:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]})
socket$inet6(0xa, 0x0, 0x0)
tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
04:42:44 executing program 2:
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='status\x00')
clone(0x0, &(0x7f0000000240), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000001240))
04:42:44 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5035a}]})
ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000140))
04:42:44 executing program 3:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000080))
04:42:44 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]})
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)})
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
04:42:44 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x50351}]})
socket$nl_netfilter(0x10, 0x3, 0xc)
fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040))
04:42:44 executing program 4:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]})
socket$inet6(0xa, 0x0, 0x0)
tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
04:42:44 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]})
seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f00000002c0)})
io_destroy(0x0)
04:42:44 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
mlockall(0x0)
04:42:44 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5035a}]})
ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000140))
04:42:44 executing program 2:
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='status\x00')
clone(0x0, &(0x7f0000000240), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000001240))
04:42:44 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x50351}]})
socket$nl_netfilter(0x10, 0x3, 0xc)
fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040))
04:42:44 executing program 3:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000080))
04:42:44 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]})
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)})
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
04:42:45 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x50351}]})
socket$nl_netfilter(0x10, 0x3, 0xc)
fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040))
04:42:45 executing program 2:
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='status\x00')
clone(0x0, &(0x7f0000000240), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000001240))
04:42:45 executing program 3:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000080))
04:42:45 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5035a}]})
ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000140))
04:42:45 executing program 0:
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040))
mlockall(0x0)
04:42:45 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]})
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)})
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
04:42:45 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6}]})
socket$nl_netfilter(0x10, 0x3, 0xc)
fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040))
04:42:45 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]})
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
04:42:45 executing program 4:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]})
socket$inet6(0xa, 0x0, 0x0)
tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
04:42:45 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]})
seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f00000002c0)})
io_destroy(0x0)
04:42:45 executing program 0:
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040))
mlockall(0x0)
04:42:45 executing program 5:
socket$nl_generic(0x10, 0x3, 0x10)
ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000140))
04:42:45 executing program 3:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000080))
04:42:45 executing program 2:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='status\x00')
clone(0x0, &(0x7f0000000240), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000001240))
04:42:45 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]})
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
[ 711.964712] kauditd_printk_skb: 5 callbacks suppressed
[ 711.964734] audit: type=1326 audit(1529728965.963:1189): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11956 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:46 executing program 5:
socket$nl_generic(0x10, 0x3, 0x10)
ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000140))
04:42:46 executing program 0:
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040))
mlockall(0x0)
04:42:46 executing program 3:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000080))
04:42:46 executing program 2:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='status\x00')
clone(0x0, &(0x7f0000000240), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000001240))
04:42:46 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]})
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
04:42:46 executing program 5:
socket$nl_generic(0x10, 0x3, 0x10)
ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000140))
04:42:46 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6}]})
socket$nl_netfilter(0x10, 0x3, 0xc)
fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040))
04:42:46 executing program 0:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040))
mlockall(0x0)
04:42:46 executing program 3:
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000080))
[ 712.318752] audit: type=1326 audit(1529728966.317:1190): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11988 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:46 executing program 2:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='status\x00')
clone(0x0, &(0x7f0000000240), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000001240))
04:42:46 executing program 5:
seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5035a}]})
socket$nl_generic(0x10, 0x3, 0x10)
ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000140))
04:42:46 executing program 4:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]})
socket$inet6(0xa, 0x0, 0x0)
tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
04:42:46 executing program 3:
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000080))
04:42:46 executing program 0:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040))
mlockall(0x0)
04:42:46 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)})
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='status\x00')
clone(0x0, &(0x7f0000000240), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000001240))
04:42:46 executing program 7:
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)})
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
04:42:46 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]})
ustat(0x0, &(0x7f00000000c0))
getpgrp(0x0)
[ 712.919879] audit: type=1326 audit(1529728966.918:1191): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12012 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:46 executing program 5:
seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5035a}]})
socket$nl_generic(0x10, 0x3, 0x10)
ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000140))
04:42:47 executing program 7:
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)})
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
04:42:47 executing program 3:
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000080))
04:42:47 executing program 0:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040))
mlockall(0x0)
04:42:47 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)})
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='status\x00')
clone(0x0, &(0x7f0000000240), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000001240))
04:42:47 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6}]})
socket$nl_netfilter(0x10, 0x3, 0xc)
fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040))
04:42:47 executing program 5:
seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5035a}]})
socket$nl_generic(0x10, 0x3, 0x10)
ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000140))
04:42:47 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]})
ustat(0x0, &(0x7f00000000c0))
getpgrp(0x0)
04:42:47 executing program 7:
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)})
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
04:42:47 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040))
mlockall(0x0)
[ 713.343943] audit: type=1326 audit(1529728967.342:1192): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12047 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:47 executing program 7:
seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]})
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)})
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
04:42:47 executing program 3:
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000080))
04:42:47 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)})
socket$nl_generic(0x10, 0x3, 0x10)
ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000140))
04:42:47 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040))
mlockall(0x0)
04:42:47 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]})
ustat(0x0, &(0x7f00000000c0))
getpgrp(0x0)
04:42:47 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)})
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='status\x00')
clone(0x0, &(0x7f0000000240), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000001240))
04:42:47 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f00000000c0)=""/121)
04:42:47 executing program 7:
seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]})
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)})
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
04:42:47 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)})
socket$nl_generic(0x10, 0x3, 0x10)
ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000140))
04:42:47 executing program 3:
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000080))
04:42:47 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040))
mlockall(0x0)
04:42:48 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f00000000c0)=""/121)
04:42:48 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]})
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='status\x00')
clone(0x0, &(0x7f0000000240), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000001240))
04:42:48 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000001c0)={'ipvs\x00'}, &(0x7f0000000200)=0x1e)
04:42:48 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)})
socket$nl_generic(0x10, 0x3, 0x10)
ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000140))
04:42:48 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022d}]})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040))
mlockall(0x0)
04:42:48 executing program 3:
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000080))
04:42:48 executing program 7:
seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]})
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)})
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
04:42:48 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0)
openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0)
04:42:48 executing program 3:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000080))
04:42:48 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022d}]})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040))
mlockall(0x0)
04:42:48 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)})
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)})
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
04:42:48 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5035a}]})
socket$nl_generic(0x10, 0x3, 0x10)
ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000140))
04:42:48 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000001c0)={'ipvs\x00'}, &(0x7f0000000200)=0x1e)
04:42:48 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f00000000c0)=""/121)
04:42:48 executing program 3:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000080))
04:42:48 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022d}]})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040))
mlockall(0x0)
04:42:48 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0)
openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0)
04:42:48 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]})
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='status\x00')
clone(0x0, &(0x7f0000000240), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000001240))
04:42:48 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)})
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)})
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
04:42:48 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5035a}]})
socket$nl_generic(0x10, 0x3, 0x10)
ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000140))
04:42:48 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000001c0)={'ipvs\x00'}, &(0x7f0000000200)=0x1e)
04:42:48 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040))
mlockall(0x0)
04:42:48 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f00000000c0)=""/121)
04:42:48 executing program 3:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000080))
04:42:48 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5035a}]})
socket$nl_generic(0x10, 0x3, 0x10)
ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000140))
04:42:48 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)})
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)})
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
04:42:48 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0)
openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0)
[ 714.891856] audit: type=1326 audit(1529728968.890:1193): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12163 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:49 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000001c0)={'ipvs\x00'}, &(0x7f0000000200)=0x1e)
04:42:49 executing program 3:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000080))
04:42:49 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f00000000c0)=""/121)
04:42:49 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]})
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='status\x00')
clone(0x0, &(0x7f0000000240), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000001240))
04:42:49 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50211}]})
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)})
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
04:42:49 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]})
socket$nl_generic(0x10, 0x3, 0x10)
ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000140))
04:42:49 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0)
openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0)
04:42:49 executing program 3:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000080))
[ 715.243293] audit: type=1326 audit(1529728969.242:1194): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12195 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:49 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]})
getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000001c0)={'ipvs\x00'}, &(0x7f0000000200)=0x1e)
04:42:49 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f00000000c0)=""/121)
04:42:49 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040))
mlockall(0x0)
04:42:49 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50211}]})
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)})
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
04:42:49 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]})
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='status\x00')
clone(0x0, &(0x7f0000000240), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000001240))
04:42:49 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0)
04:42:49 executing program 3:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000080))
04:42:49 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]})
getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000001c0)={'ipvs\x00'}, &(0x7f0000000200)=0x1e)
04:42:49 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f00000000c0)=""/121)
[ 715.810123] audit: type=1326 audit(1529728969.807:1195): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12216 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:49 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50211}]})
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)})
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
04:42:49 executing program 3:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000080))
[ 715.882989] audit: type=1326 audit(1529728969.837:1196): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12220 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:49 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0)
04:42:49 executing program 4:
socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f00000000c0)=""/121)
[ 716.044415] audit: type=1326 audit(1529728970.043:1197): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12236 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:50 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]})
socket$nl_generic(0x10, 0x3, 0x10)
ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000140))
04:42:50 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]})
getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000001c0)={'ipvs\x00'}, &(0x7f0000000200)=0x1e)
04:42:50 executing program 4:
socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f00000000c0)=""/121)
04:42:50 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]})
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)})
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
04:42:50 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0)
[ 716.175857] audit: type=1326 audit(1529728970.174:1198): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12247 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:50 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]})
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000040))
mlockall(0x0)
04:42:50 executing program 4:
socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f00000000c0)=""/121)
04:42:50 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]})
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='status\x00')
clone(0x0, &(0x7f0000000240), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000001240))
04:42:50 executing program 6:
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000001c0)={'ipvs\x00'}, &(0x7f0000000200)=0x1e)
04:42:50 executing program 1:
mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0)
openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0)
04:42:50 executing program 4:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f00000000c0)=""/121)
04:42:50 executing program 1:
mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0)
openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0)
04:42:50 executing program 6:
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000001c0)={'ipvs\x00'}, &(0x7f0000000200)=0x1e)
04:42:50 executing program 3:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000080))
04:42:50 executing program 4:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f00000000c0)=""/121)
04:42:51 executing program 1:
mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0)
openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0)
[ 717.011661] kauditd_printk_skb: 3 callbacks suppressed
[ 717.011685] audit: type=1326 audit(1529728971.010:1202): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12292 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:51 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]})
socket$nl_generic(0x10, 0x3, 0x10)
ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000140))
04:42:51 executing program 6:
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000001c0)={'ipvs\x00'}, &(0x7f0000000200)=0x1e)
04:42:51 executing program 4:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f00000000c0)=""/121)
04:42:51 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0)
openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0)
04:42:51 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]})
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)})
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
[ 717.198740] audit: type=1326 audit(1529728971.196:1203): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12306 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
[ 717.240523] audit: type=1326 audit(1529728971.217:1204): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12309 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:51 executing program 6:
seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000001c0)={'ipvs\x00'}, &(0x7f0000000200)=0x1e)
04:42:51 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0)
openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0)
04:42:51 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]})
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='status\x00')
clone(0x0, &(0x7f0000000240), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000001240))
04:42:51 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)})
socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f00000000c0)=""/121)
04:42:51 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
semget$private(0x0, 0x0, 0x0)
04:42:51 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0)
openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0)
04:42:51 executing program 6:
seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000001c0)={'ipvs\x00'}, &(0x7f0000000200)=0x1e)
04:42:51 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)})
socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f00000000c0)=""/121)
[ 717.859256] audit: type=1326 audit(1529728971.857:1205): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12335 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:51 executing program 3:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000080))
04:42:51 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0)
openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0)
04:42:51 executing program 6:
seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000001c0)={'ipvs\x00'}, &(0x7f0000000200)=0x1e)
[ 718.029036] audit: type=1326 audit(1529728972.026:1206): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12350 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:52 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]})
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)})
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
04:42:52 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)})
socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f00000000c0)=""/121)
04:42:52 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]})
ustat(0x0, &(0x7f00000000c0))
keyctl$clear(0x7, 0x0)
04:42:52 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000001c0)={'ipvs\x00'}, &(0x7f0000000200)=0x1e)
04:42:52 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0)
openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0)
04:42:52 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0)
setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000240), 0x4)
[ 718.213502] audit: type=1326 audit(1529728972.212:1207): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12359 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:52 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]})
socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f00000000c0)=""/121)
04:42:52 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]})
socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f00000000c0)=""/121)
04:42:52 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000001c0)={'ipvs\x00'}, &(0x7f0000000200)=0x1e)
04:42:52 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0)
openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0)
04:42:52 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]})
ustat(0x0, &(0x7f00000000c0))
keyctl$clear(0x7, 0x0)
04:42:52 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0)
setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000240), 0x4)
04:42:52 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0)
fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000100))
04:42:52 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]})
ustat(0x0, &(0x7f00000000c0))
keyctl$clear(0x7, 0x0)
04:42:52 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000001c0)={'ipvs\x00'}, &(0x7f0000000200)=0x1e)
04:42:52 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]})
socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f00000000c0)=""/121)
04:42:53 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000180)={'ifb0\x00', {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}})
04:42:53 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0)
openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0)
04:42:53 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0)
setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000240), 0x4)
04:42:53 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000100))
04:42:53 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]})
socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f00000000c0)=""/121)
04:42:53 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]})
memfd_create(&(0x7f0000000140)='(%wlan0eth1\x00', 0x0)
ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000000c0))
04:42:53 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000001c0)={'ipvs\x00'}, &(0x7f0000000200)=0x1e)
04:42:53 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]})
ustat(0x0, &(0x7f00000000c0))
keyctl$clear(0x7, 0x0)
[ 719.178006] audit: type=1326 audit(1529728973.176:1208): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12415 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:53 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000001c0)={'ipvs\x00'}, &(0x7f0000000200)=0x1e)
04:42:53 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0)
openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0)
04:42:53 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0)
setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000240), 0x4)
04:42:53 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]})
keyctl$clear(0x7, 0x0)
04:42:53 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]})
memfd_create(&(0x7f0000000140)='(%wlan0eth1\x00', 0x0)
ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000000c0))
04:42:53 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000100))
04:42:53 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000180)={'ifb0\x00', {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}})
04:42:53 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0)
openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0)
04:42:53 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000001c0)={'ipvs\x00'}, &(0x7f0000000200)=0x1e)
04:42:53 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000240), 0x4)
04:42:53 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]})
keyctl$clear(0x7, 0x0)
04:42:53 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]})
memfd_create(&(0x7f0000000140)='(%wlan0eth1\x00', 0x0)
ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000000c0))
04:42:54 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000180)={'ifb0\x00', {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}})
04:42:54 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000100))
04:42:54 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000240), 0x4)
04:42:54 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0)
openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0)
04:42:54 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]})
memfd_create(&(0x7f0000000140)='(%wlan0eth1\x00', 0x0)
ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000000c0))
04:42:54 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]})
socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f00000000c0)=""/121)
04:42:54 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]})
keyctl$clear(0x7, 0x0)
04:42:54 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000001c0)={'ipvs\x00'}, &(0x7f0000000200)=0x1e)
[ 720.105225] audit: type=1326 audit(1529728974.103:1209): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12480 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
[ 720.166833] audit: type=1326 audit(1529728974.154:1210): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12491 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:54 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000240), 0x4)
[ 720.231519] audit: type=1326 audit(1529728974.199:1211): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12482 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:54 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000100))
04:42:54 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000180)={'ifb0\x00', {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}})
04:42:54 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]})
ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000000c0))
04:42:54 executing program 0:
ustat(0x0, &(0x7f00000000c0))
keyctl$clear(0x7, 0x0)
04:42:54 executing program 5:
openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0)
setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000240), 0x4)
04:42:54 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000180)={'ifb0\x00', {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}})
04:42:54 executing program 0:
ustat(0x0, &(0x7f00000000c0))
keyctl$clear(0x7, 0x0)
04:42:54 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]})
ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000100))
04:42:55 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]})
socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f00000000c0)=""/121)
04:42:55 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]})
ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000000c0))
04:42:55 executing program 5:
openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0)
setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000240), 0x4)
04:42:55 executing program 0:
ustat(0x0, &(0x7f00000000c0))
keyctl$clear(0x7, 0x0)
04:42:55 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000180)={'ifb0\x00', {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}})
04:42:55 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]})
ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000100))
04:42:55 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0)
openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0)
04:42:55 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000001c0)={'ipvs\x00'}, &(0x7f0000000200)=0x1e)
04:42:55 executing program 0:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]})
ustat(0x0, &(0x7f00000000c0))
keyctl$clear(0x7, 0x0)
04:42:55 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]})
ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000000c0))
04:42:55 executing program 5:
openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0)
setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000240), 0x4)
04:42:55 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]})
ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000100))
04:42:55 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000180)={'ifb0\x00', {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}})
04:42:55 executing program 0:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]})
ustat(0x0, &(0x7f00000000c0))
keyctl$clear(0x7, 0x0)
04:42:55 executing program 2:
memfd_create(&(0x7f0000000140)='(%wlan0eth1\x00', 0x0)
ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000000c0))
04:42:55 executing program 5:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0)
setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000240), 0x4)
04:42:56 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000001c0)={'ipvs\x00'}, &(0x7f0000000200)=0x1e)
04:42:56 executing program 3:
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000180)={'ifb0\x00', {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}})
04:42:56 executing program 2:
memfd_create(&(0x7f0000000140)='(%wlan0eth1\x00', 0x0)
ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000000c0))
04:42:56 executing program 7:
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000100))
04:42:56 executing program 5:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0)
setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000240), 0x4)
04:42:56 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0)
openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0)
04:42:56 executing program 0:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]})
ustat(0x0, &(0x7f00000000c0))
keyctl$clear(0x7, 0x0)
04:42:56 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpu.stat\x00', 0x0, 0x0)
ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000080))
[ 722.112819] kauditd_printk_skb: 3 callbacks suppressed
[ 722.112843] audit: type=1326 audit(1529728976.111:1215): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12587 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:56 executing program 2:
memfd_create(&(0x7f0000000140)='(%wlan0eth1\x00', 0x0)
ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000000c0))
04:42:56 executing program 3:
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000180)={'ifb0\x00', {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}})
04:42:56 executing program 7:
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000100))
04:42:56 executing program 5:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0)
setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000240), 0x4)
04:42:56 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000300)})
ustat(0x0, &(0x7f00000000c0))
keyctl$clear(0x7, 0x0)
[ 722.256440] audit: type=1326 audit(1529728976.137:1216): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12589 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:56 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpu.stat\x00', 0x0, 0x0)
ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000080))
04:42:56 executing program 3:
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000180)={'ifb0\x00', {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}})
04:42:56 executing program 2:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]})
memfd_create(&(0x7f0000000140)='(%wlan0eth1\x00', 0x0)
ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000000c0))
04:42:57 executing program 7:
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000100))
04:42:57 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0)
setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000240), 0x4)
04:42:57 executing program 3:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000180)={'ifb0\x00', {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}})
04:42:57 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000300)})
ustat(0x0, &(0x7f00000000c0))
keyctl$clear(0x7, 0x0)
04:42:57 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpu.stat\x00', 0x0, 0x0)
ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000080))
04:42:57 executing program 2:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]})
memfd_create(&(0x7f0000000140)='(%wlan0eth1\x00', 0x0)
ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000000c0))
04:42:57 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
pipe2(&(0x7f0000000000), 0x0)
ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000040)=""/5)
04:42:57 executing program 1:
04:42:57 executing program 7:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000100))
04:42:57 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]})
seccomp(0x0, 0x0, &(0x7f0000000080))
exit(0x0)
04:42:57 executing program 3:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000180)={'ifb0\x00', {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}})
04:42:57 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000300)})
ustat(0x0, &(0x7f00000000c0))
keyctl$clear(0x7, 0x0)
04:42:57 executing program 2:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]})
memfd_create(&(0x7f0000000140)='(%wlan0eth1\x00', 0x0)
ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000000c0))
04:42:57 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0)
setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000240), 0x4)
04:42:57 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpu.stat\x00', 0x0, 0x0)
ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000080))
04:42:57 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
pipe2(&(0x7f0000000000), 0x0)
ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000040)=""/5)
04:42:57 executing program 7:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000100))
04:42:57 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x50351}]})
ustat(0x0, &(0x7f00000000c0))
keyctl$clear(0x7, 0x0)
04:42:57 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)})
openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0)
setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000240), 0x4)
04:42:57 executing program 3:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000180)={'ifb0\x00', {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}})
04:42:57 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)})
memfd_create(&(0x7f0000000140)='(%wlan0eth1\x00', 0x0)
ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000000c0))
04:42:57 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000080))
04:42:57 executing program 7:
seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000100))
04:42:57 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
pipe2(&(0x7f0000000000), 0x0)
ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000040)=""/5)
04:42:57 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50345}]})
ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000040))
geteuid()
04:42:57 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000180)={'ifb0\x00', {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}})
04:42:57 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x50351}]})
ustat(0x0, &(0x7f00000000c0))
keyctl$clear(0x7, 0x0)
04:42:57 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0)
setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000240), 0x4)
04:42:57 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)})
memfd_create(&(0x7f0000000140)='(%wlan0eth1\x00', 0x0)
ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000000c0))
04:42:57 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000080))
04:42:57 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040))
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000100))
04:42:57 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000180)={'ifb0\x00', {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}})
04:42:57 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x50351}]})
ustat(0x0, &(0x7f00000000c0))
keyctl$clear(0x7, 0x0)
04:42:57 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
pipe2(&(0x7f0000000000), 0x0)
ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000040)=""/5)
04:42:57 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0)
setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000240), 0x4)
04:42:57 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)})
memfd_create(&(0x7f0000000140)='(%wlan0eth1\x00', 0x0)
ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000000c0))
04:42:58 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50345}]})
ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000040))
geteuid()
04:42:58 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040))
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000100))
04:42:58 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000080))
04:42:58 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000180)={'ifb0\x00', {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}})
04:42:58 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6}]})
ustat(0x0, &(0x7f00000000c0))
keyctl$clear(0x7, 0x0)
04:42:58 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]})
memfd_create(&(0x7f0000000140)='(%wlan0eth1\x00', 0x0)
ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000000c0))
04:42:58 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0)
setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000240), 0x4)
04:42:58 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000040)=""/5)
04:42:58 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040))
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000100))
[ 724.249677] audit: type=1326 audit(1529728978.248:1217): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12743 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:58 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50345}]})
ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000040))
geteuid()
04:42:58 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000180)={'ifb0\x00', {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}})
04:42:58 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]})
memfd_create(&(0x7f0000000140)='(%wlan0eth1\x00', 0x0)
ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000000c0))
04:42:58 executing program 4:
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpu.stat\x00', 0x0, 0x0)
ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000080))
04:42:58 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50356}]})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000100))
04:42:58 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0)
setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000240), 0x4)
04:42:58 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000040)=""/5)
04:42:58 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50345}]})
ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000040))
geteuid()
[ 724.583528] audit: type=1326 audit(1529728978.582:1218): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12777 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:58 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000180)={'ifb0\x00', {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}})
04:42:58 executing program 4:
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpu.stat\x00', 0x0, 0x0)
ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000080))
04:42:58 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]})
memfd_create(&(0x7f0000000140)='(%wlan0eth1\x00', 0x0)
ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000000c0))
04:42:59 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50345}]})
geteuid()
04:42:59 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]})
memfd_create(&(0x7f0000000140)='(%wlan0eth1\x00', 0x0)
ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000000c0))
04:42:59 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50356}]})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000100))
04:42:59 executing program 4:
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpu.stat\x00', 0x0, 0x0)
ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000080))
04:42:59 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000040)=""/5)
04:42:59 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000180)={'ifb0\x00', {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}})
04:42:59 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6}]})
ustat(0x0, &(0x7f00000000c0))
keyctl$clear(0x7, 0x0)
04:42:59 executing program 4:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpu.stat\x00', 0x0, 0x0)
ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000080))
[ 725.177714] audit: type=1326 audit(1529728979.176:1219): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12806 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:59 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50356}]})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000100))
04:42:59 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000180)={'ifb0\x00', {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}})
[ 725.258782] audit: type=1326 audit(1529728979.243:1220): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12814 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
[ 725.363469] audit: type=1326 audit(1529728979.361:1221): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12823 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:59 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0)
setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000240), 0x4)
04:42:59 executing program 6:
pipe2(&(0x7f0000000000), 0x0)
ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000040)=""/5)
04:42:59 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50345}]})
geteuid()
04:42:59 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000100))
04:42:59 executing program 4:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpu.stat\x00', 0x0, 0x0)
ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000080))
[ 725.493925] audit: type=1326 audit(1529728979.492:1222): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12830 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:42:59 executing program 6:
pipe2(&(0x7f0000000000), 0x0)
ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000040)=""/5)
04:42:59 executing program 4:
seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]})
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpu.stat\x00', 0x0, 0x0)
ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000080))
[ 725.554117] audit: type=1326 audit(1529728979.536:1223): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12838 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:43:00 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6}]})
ustat(0x0, &(0x7f00000000c0))
keyctl$clear(0x7, 0x0)
04:43:00 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50345}]})
geteuid()
04:43:00 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)})
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpu.stat\x00', 0x0, 0x0)
ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000080))
04:43:00 executing program 6:
pipe2(&(0x7f0000000000), 0x0)
ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000040)=""/5)
04:43:00 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]})
memfd_create(&(0x7f0000000140)='(%wlan0eth1\x00', 0x0)
ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000000c0))
04:43:00 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)})
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpu.stat\x00', 0x0, 0x0)
ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000080))
[ 726.187906] audit: type=1326 audit(1529728980.183:1224): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12854 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:43:00 executing program 6:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
pipe2(&(0x7f0000000000), 0x0)
ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000040)=""/5)
04:43:00 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000180)={'ifb0\x00', {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}})
04:43:00 executing program 1:
ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000040))
geteuid()
04:43:00 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]})
openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0)
setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000240), 0x4)
04:43:00 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)})
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpu.stat\x00', 0x0, 0x0)
ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000080))
04:43:00 executing program 6:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
pipe2(&(0x7f0000000000), 0x0)
ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000040)=""/5)
04:43:00 executing program 1:
ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000040))
geteuid()
04:43:00 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000100))
04:43:00 executing program 1:
ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000040))
geteuid()
04:43:00 executing program 6:
seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]})
pipe2(&(0x7f0000000000), 0x0)
ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000040)=""/5)
04:43:01 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]})
memfd_create(&(0x7f0000000140)='(%wlan0eth1\x00', 0x0)
ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f00000000c0))
04:43:01 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50345}]})
ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000040))
geteuid()
04:43:01 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)})
pipe2(&(0x7f0000000000), 0x0)
ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000040)=""/5)
04:43:01 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]})
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpu.stat\x00', 0x0, 0x0)
ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000080))
04:43:01 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040))
ioprio_get$pid(0x0, 0x0)
[ 727.163240] kauditd_printk_skb: 4 callbacks suppressed
[ 727.163262] audit: type=1326 audit(1529728981.161:1229): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12910 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:43:01 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]})
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpu.stat\x00', 0x0, 0x0)
ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000080))
04:43:01 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)})
pipe2(&(0x7f0000000000), 0x0)
ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000040)=""/5)
04:43:01 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]})
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0)
ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000180)={'ifb0\x00', {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}})
04:43:01 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50345}]})
ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000040))
geteuid()
[ 727.368720] audit: type=1326 audit(1529728981.367:1230): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12932 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:43:01 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000100))
04:43:01 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]})
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpu.stat\x00', 0x0, 0x0)
ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000080))
04:43:01 executing program 1:
seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50345}]})
ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000040))
geteuid()
04:43:01 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)})
pipe2(&(0x7f0000000000), 0x0)
ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000040)=""/5)
04:43:01 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040))
ioprio_get$pid(0x0, 0x0)
04:43:01 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
pipe2(&(0x7f00000000c0), 0x0)
getpgid(0x0)
[ 727.559024] audit: type=1326 audit(1529728981.557:1231): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12940 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:43:01 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]})
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpu.stat\x00', 0x0, 0x0)
ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000080))
[ 727.664094] audit: type=1326 audit(1529728981.662:1232): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12954 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:43:02 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]})
pipe(&(0x7f0000000000))
clock_gettime(0x0, &(0x7f0000000140))
04:43:02 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)})
ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000040))
geteuid()
04:43:02 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]})
pipe2(&(0x7f0000000000), 0x0)
ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000040)=""/5)
04:43:02 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040))
ioprio_get$pid(0x0, 0x0)
04:43:02 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]})
openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.type\x00', 0x2, 0x0)
syz_fuseblk_mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
04:43:02 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)})
ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000040))
geteuid()
04:43:02 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]})
pipe2(&(0x7f0000000000), 0x0)
ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000040)=""/5)
04:43:02 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0)
io_cancel(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000740)}, &(0x7f0000000480))
04:43:02 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040))
ioprio_get$pid(0x0, 0x0)
04:43:02 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
removexattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@random={'btrfs.', '/dev/uinput\x00'})
04:43:02 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)})
ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000040))
geteuid()
04:43:02 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]})
pipe2(&(0x7f0000000000), 0x0)
ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000040)=""/5)
04:43:02 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x0)
mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='sysfs\x00', 0x0, &(0x7f00000002c0))
04:43:02 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]})
openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0)
seccomp(0x0, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000140)})
04:43:02 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0)
io_cancel(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000740)}, &(0x7f0000000480))
04:43:02 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]})
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpu.stat\x00', 0x0, 0x0)
ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000080))
04:43:02 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
ioprio_get$pid(0x0, 0x0)
04:43:02 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x50345}]})
ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000040))
geteuid()
04:43:02 executing program 6:
seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]})
pipe2(&(0x7f0000000000), 0x0)
ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000040)=""/5)
04:43:02 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
removexattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@random={'btrfs.', '/dev/uinput\x00'})
04:43:02 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040), 0x20)
ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0)
[ 728.692281] audit: type=1326 audit(1529728982.690:1233): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13014 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:43:02 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]})
openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0)
seccomp(0x0, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000140)})
04:43:02 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x50345}]})
ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000040))
geteuid()
[ 728.785418] audit: type=1326 audit(1529728982.783:1234): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13022 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0
04:43:02 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
ioprio_get$pid(0x0, 0x0)
04:43:02 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0)
io_cancel(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000740)}, &(0x7f0000000480))
04:43:02 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]})
openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
removexattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@random={'btrfs.', '/dev/uinput\x00'})
04:43:02 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x50345}]})
ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000040))
geteuid()
04:43:03 executing program 7:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]})
openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0)
seccomp(0x0, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000140)})
04:43:03 executing program 5:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]})
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040), 0x20)
ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0)
04:43:03 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
ioprio_get$pid(0x0, 0x0)
04:43:03 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]})
openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0)
io_cancel(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000740)}, &(0x7f0000000480))
[ 729.321131] ==================================================================
[ 729.328656] BUG: KMSAN: uninit-value in rcu_segcblist_enqueue+0x239/0x2d0
[ 729.335582] CPU: 1 PID: 0 Comm: swapper/1 Not tainted 4.17.0+ #9
[ 729.341717] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 729.351065] Call Trace:
[ 729.353644]
[ 729.355805] dump_stack+0x185/0x1d0
[ 729.360226] kmsan_report+0x188/0x2a0
[ 729.364030] __msan_warning_32+0x70/0xc0
[ 729.368083] rcu_segcblist_enqueue+0x239/0x2d0
[ 729.372649] __call_rcu+0x227/0xef0
[ 729.376260] ? __d_free+0x66/0x80
[ 729.379696] ? __put_cred+0x180/0x180
[ 729.383481] call_rcu_sched+0x32/0x40
[ 729.387267] __put_cred+0x102/0x180
[ 729.390880] file_free_rcu+0xc7/0x150
[ 729.394676] ? put_filp+0x160/0x160
[ 729.398282] rcu_process_callbacks+0x18dd/0x2060
[ 729.403026] ? rcu_scheduler_starting+0xe0/0xe0
[ 729.407701] __do_softirq+0x592/0x979
[ 729.411486] irq_exit+0x202/0x240
[ 729.414919] exiting_irq+0xe/0x10
[ 729.418354] smp_apic_timer_interrupt+0x64/0x90
[ 729.423014] apic_timer_interrupt+0xf/0x20
[ 729.427232]
[ 729.429458] RIP: 0010:default_idle+0x20b/0x3e0
[ 729.434023] RSP: 0018:ffff8801d8e5fdf0 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13
[ 729.441729] RAX: ffff8801fd432f18 RBX: 0000000000000000 RCX: ffff880000000000
[ 729.448999] RDX: ffff8801fd032f18 RSI: aaaaaaaaaaaab000 RDI: ffffea0000000000
[ 729.456599] RBP: ffff8801d8e5fe28 R08: 0000000001080020 R09: 0000000000000002
[ 729.463858] R10: 0000000000000000 R11: ffffffff89fef830 R12: ffff8801d8e5fe8f
[ 729.471115] R13: ffff8801d8da57c0 R14: ffff8801d8e5fe8c R15: ffff8801d8da6098
[ 729.478388] ? __cpuidle_text_start+0x8/0x8
[ 729.482723] ? __cpuidle_text_start+0x8/0x8
[ 729.487041] arch_cpu_idle+0x26/0x30
[ 729.490744] do_idle+0x36d/0x830
[ 729.494100] cpu_startup_entry+0x45/0x50
[ 729.498143] ? setup_APIC_timer+0x220/0x220
[ 729.502457] start_secondary+0x3c6/0x490
[ 729.506621] secondary_startup_64+0xa5/0xb0
[ 729.510931]
[ 729.512546] Uninit was stored to memory at:
[ 729.516850] kmsan_internal_chain_origin+0x12b/0x210
[ 729.521931] __msan_chain_origin+0x69/0xc0
[ 729.526150] rcu_segcblist_enqueue+0x275/0x2d0
[ 729.530725] __call_rcu+0x227/0xef0
[ 729.534357] call_rcu_sched+0x32/0x40
[ 729.538138] release_task+0x24b9/0x2530
[ 729.542100] do_exit+0x2e11/0x3930
[ 729.545637] do_group_exit+0x1a0/0x360
[ 729.549504] get_signal+0x1405/0x1ec0
[ 729.553554] do_signal+0xb8/0x1d20
[ 729.557085] prepare_exit_to_usermode+0x271/0x3a0
[ 729.561939] syscall_return_slowpath+0xe9/0x710
[ 729.566699] do_syscall_64+0x1ad/0x230
[ 729.570572] entry_SYSCALL_64_after_hwframe+0x44/0xa9
[ 729.575745]
[ 729.577379] Uninit was created at:
[ 729.581193] kmsan_internal_poison_shadow+0xb8/0x1b0
[ 729.586295] kmsan_kmalloc+0x94/0x100
[ 729.590100] kmem_cache_alloc+0xa97/0xb70
[ 729.594243] alloc_pid+0x7f/0xce0
[ 729.597699] copy_process+0x3fbb/0x9be0
[ 729.601673] _do_fork+0x353/0xf60
[ 729.605124] __x64_sys_clone+0x15e/0x1b0
[ 729.609184] do_syscall_64+0x15b/0x230
[ 729.613073] entry_SYSCALL_64_after_hwframe+0x44/0xa9
[ 729.618246] ==================================================================
[ 729.625595] Disabling lock debugging due to kernel taint
[ 729.631035] Kernel panic - not syncing: panic_on_warn set ...
[ 729.631035]
[ 729.638392] CPU: 1 PID: 0 Comm: swapper/1 Tainted: G B 4.17.0+ #9
[ 729.645925] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 729.655355] Call Trace:
[ 729.657915]
[ 729.660059] dump_stack+0x185/0x1d0
[ 729.663685] panic+0x3d0/0x990
[ 729.666894] kmsan_report+0x29e/0x2a0
[ 729.670694] __msan_warning_32+0x70/0xc0
[ 729.674751] rcu_segcblist_enqueue+0x239/0x2d0
[ 729.679325] __call_rcu+0x227/0xef0
[ 729.682934] ? __d_free+0x66/0x80
[ 729.686376] ? __put_cred+0x180/0x180
[ 729.690175] call_rcu_sched+0x32/0x40
[ 729.693966] __put_cred+0x102/0x180
[ 729.697582] file_free_rcu+0xc7/0x150
[ 729.701365] ? put_filp+0x160/0x160
[ 729.704972] rcu_process_callbacks+0x18dd/0x2060
[ 729.709721] ? rcu_scheduler_starting+0xe0/0xe0
[ 729.714373] __do_softirq+0x592/0x979
[ 729.718157] irq_exit+0x202/0x240
[ 729.721592] exiting_irq+0xe/0x10
[ 729.725034] smp_apic_timer_interrupt+0x64/0x90
[ 729.729705] apic_timer_interrupt+0xf/0x20
[ 729.733913]
[ 729.736130] RIP: 0010:default_idle+0x20b/0x3e0
[ 729.740685] RSP: 0018:ffff8801d8e5fdf0 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13
[ 729.748371] RAX: ffff8801fd432f18 RBX: 0000000000000000 RCX: ffff880000000000
[ 729.755621] RDX: ffff8801fd032f18 RSI: aaaaaaaaaaaab000 RDI: ffffea0000000000
[ 729.762870] RBP: ffff8801d8e5fe28 R08: 0000000001080020 R09: 0000000000000002
[ 729.770118] R10: 0000000000000000 R11: ffffffff89fef830 R12: ffff8801d8e5fe8f
[ 729.777364] R13: ffff8801d8da57c0 R14: ffff8801d8e5fe8c R15: ffff8801d8da6098
[ 729.784617] ? __cpuidle_text_start+0x8/0x8
[ 729.788918] ? __cpuidle_text_start+0x8/0x8
[ 729.793219] arch_cpu_idle+0x26/0x30
[ 729.796912] do_idle+0x36d/0x830
[ 729.800257] cpu_startup_entry+0x45/0x50
[ 729.804296] ? setup_APIC_timer+0x220/0x220
[ 729.808682] start_secondary+0x3c6/0x490
[ 729.812723] secondary_startup_64+0xa5/0xb0
[ 729.817570] Dumping ftrace buffer:
[ 729.821092] (ftrace buffer empty)
[ 729.824796] Kernel Offset: disabled
[ 729.828412] Rebooting in 86400 seconds..