all=202 compat=0 ip=0x455a99 code=0x0 [ 645.362169] audit: type=1326 audit(1529728897.347:1073): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8703 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:37 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='illinois\x00', 0x9) 04:41:37 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$inet_tcp(0x2, 0x1, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) 04:41:37 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f00000001c0), 0x4) 04:41:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) readlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000280)=""/189, 0xbd) 04:41:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) prctl$setptracer(0x59616d61, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cuse\x00', 0x0, 0x0) 04:41:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket$inet_udplite(0x2, 0x2, 0x88) 04:41:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f00000001c0), 0x4) 04:41:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) 04:41:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='illinois\x00', 0x9) 04:41:38 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000100)={'icmp6\x00'}, &(0x7f0000000180)=0x1e) [ 646.131810] audit: type=1326 audit(1529728898.130:1074): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8739 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket$inet_udplite(0x2, 0x2, 0x88) 04:41:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) 04:41:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) 04:41:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f00000001c0), 0x4) 04:41:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) prctl$setptracer(0x59616d61, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cuse\x00', 0x0, 0x0) 04:41:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='illinois\x00', 0x9) 04:41:38 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000100)={'icmp6\x00'}, &(0x7f0000000180)=0x1e) 04:41:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket$inet_udplite(0x2, 0x2, 0x88) 04:41:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) 04:41:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='illinois\x00', 0x9) 04:41:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f00000001c0), 0x4) 04:41:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) prctl$setptracer(0x59616d61, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cuse\x00', 0x0, 0x0) 04:41:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket$inet_udplite(0x2, 0x2, 0x88) 04:41:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000100)={'icmp6\x00'}, &(0x7f0000000180)=0x1e) 04:41:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) 04:41:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff6000/0x8000)=nil) flistxattr(0xffffffffffffffff, &(0x7f0000000ec0)=""/82, 0x52) 04:41:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) prctl$setptracer(0x59616d61, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cuse\x00', 0x0, 0x0) 04:41:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f00000001c0), 0x4) 04:41:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) 04:41:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='illinois\x00', 0x9) 04:41:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000100)={'icmp6\x00'}, &(0x7f0000000180)=0x1e) 04:41:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket$inet_udplite(0x2, 0x2, 0x88) 04:41:39 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) llistxattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/105, 0x69) 04:41:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) prctl$setptracer(0x59616d61, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cuse\x00', 0x0, 0x0) 04:41:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f00000001c0), 0x4) [ 647.375308] kauditd_printk_skb: 2 callbacks suppressed [ 647.375331] audit: type=1326 audit(1529728899.374:1077): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8810 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 647.428479] audit: type=1326 audit(1529728899.415:1078): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8808 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 647.448302] audit: type=1326 audit(1529728899.416:1079): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8807 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='illinois\x00', 0x9) [ 647.467967] audit: type=1326 audit(1529728899.418:1080): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8816 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000100)={'icmp6\x00'}, &(0x7f0000000180)=0x1e) 04:41:39 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) llistxattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/105, 0x69) 04:41:39 executing program 3: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='illinois\x00', 0x9) 04:41:39 executing program 3: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='illinois\x00', 0x9) 04:41:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) 04:41:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000100)={'icmp6\x00'}, &(0x7f0000000180)=0x1e) 04:41:39 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) llistxattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/105, 0x69) 04:41:39 executing program 3: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='illinois\x00', 0x9) [ 648.033745] audit: type=1326 audit(1529728900.032:1081): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8849 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f00000001c0), 0x4) 04:41:40 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='illinois\x00', 0x9) 04:41:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000100)={'icmp6\x00'}, &(0x7f0000000180)=0x1e) 04:41:40 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) llistxattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/105, 0x69) 04:41:40 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) prctl$setptracer(0x59616d61, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cuse\x00', 0x0, 0x0) 04:41:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket$inet_udplite(0x2, 0x2, 0x88) 04:41:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000180)) [ 648.399096] audit: type=1326 audit(1529728900.395:1082): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8861 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:40 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='illinois\x00', 0x9) 04:41:40 executing program 4: write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000100)={'icmp6\x00'}, &(0x7f0000000180)=0x1e) 04:41:40 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) llistxattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/105, 0x69) [ 648.479997] audit: type=1326 audit(1529728900.421:1083): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8867 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 648.499892] audit: type=1326 audit(1529728900.422:1084): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8866 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:40 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='illinois\x00', 0x9) 04:41:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000180)) 04:41:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) 04:41:40 executing program 4: write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000100)={'icmp6\x00'}, &(0x7f0000000180)=0x1e) 04:41:40 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) llistxattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/105, 0x69) 04:41:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='illinois\x00', 0x9) [ 648.973739] audit: type=1326 audit(1529728900.972:1085): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8896 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:41 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f00000001c0), 0x4) 04:41:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000180)) 04:41:41 executing program 4: write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000100)={'icmp6\x00'}, &(0x7f0000000180)=0x1e) 04:41:41 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) llistxattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/105, 0x69) 04:41:41 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) prctl$setptracer(0x59616d61, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cuse\x00', 0x0, 0x0) 04:41:41 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='illinois\x00', 0x9) 04:41:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket$inet_udplite(0x2, 0x2, 0x88) [ 649.361787] audit: type=1326 audit(1529728901.360:1086): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8919 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:41 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000100)={'icmp6\x00'}, &(0x7f0000000180)=0x1e) 04:41:41 executing program 5: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) llistxattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/105, 0x69) 04:41:41 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='illinois\x00', 0x9) 04:41:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000180)) 04:41:41 executing program 5: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) llistxattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/105, 0x69) 04:41:41 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='illinois\x00', 0x9) 04:41:41 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000100)={'icmp6\x00'}, &(0x7f0000000180)=0x1e) 04:41:41 executing program 5: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) llistxattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/105, 0x69) 04:41:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000180)) 04:41:42 executing program 5: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) llistxattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/105, 0x69) 04:41:42 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000040)) 04:41:42 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000100)={'icmp6\x00'}, &(0x7f0000000180)=0x1e) 04:41:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='illinois\x00', 0x9) 04:41:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) 04:41:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000180)) 04:41:42 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) 04:41:42 executing program 5: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) llistxattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/105, 0x69) 04:41:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='illinois\x00', 0x9) 04:41:42 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000100)={0x0, 0x0, 0x0, {}, {}, @ramp}) 04:41:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000100)={'icmp6\x00'}, &(0x7f0000000180)=0x1e) 04:41:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='illinois\x00', 0x9) 04:41:42 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000040)) 04:41:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000180)) 04:41:42 executing program 5: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) llistxattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/105, 0x69) 04:41:42 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) 04:41:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000100)={'icmp6\x00'}, &(0x7f0000000180)=0x1e) 04:41:42 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000100)={0x0, 0x0, 0x0, {}, {}, @ramp}) 04:41:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) 04:41:42 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) llistxattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/105, 0x69) 04:41:42 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000180)) 04:41:42 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000040)) 04:41:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000100)={'icmp6\x00'}, &(0x7f0000000180)=0x1e) 04:41:42 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) 04:41:43 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) llistxattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/105, 0x69) 04:41:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000100)={0x0, 0x0, 0x0, {}, {}, @ramp}) 04:41:43 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000180)) 04:41:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000100)={'icmp6\x00'}, &(0x7f0000000180)=0x1e) 04:41:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000100)={0x0, 0x0, 0x0, {}, {}, @ramp}) 04:41:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) 04:41:43 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) llistxattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/105, 0x69) 04:41:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000040)) 04:41:43 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000180)) 04:41:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='illinois\x00', 0x9) 04:41:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) 04:41:43 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000180)) 04:41:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000100)={'icmp6\x00'}, &(0x7f0000000180)=0x1e) 04:41:43 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) llistxattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/105, 0x69) 04:41:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) 04:41:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000040)) 04:41:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) 04:41:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000100)={0x0, 0x0, 0x0, {}, {}, @ramp}) 04:41:43 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000180)) 04:41:43 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) llistxattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/105, 0x69) 04:41:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) 04:41:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='illinois\x00', 0x9) 04:41:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000100)={'icmp6\x00'}, &(0x7f0000000180)=0x1e) 04:41:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) 04:41:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000040)) 04:41:44 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) llistxattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/105, 0x69) 04:41:44 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000180)) 04:41:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000100)={0x0, 0x0, 0x0, {}, {}, @ramp}) 04:41:44 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) llistxattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/105, 0x69) [ 652.616876] kauditd_printk_skb: 4 callbacks suppressed [ 652.616899] audit: type=1326 audit(1529728904.615:1091): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9119 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000100)={'icmp6\x00'}, &(0x7f0000000180)=0x1e) 04:41:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000040)) 04:41:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) 04:41:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) 04:41:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000180)) 04:41:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000100)={0x0, 0x0, 0x0, {}, {}, @ramp}) [ 652.720748] audit: type=1326 audit(1529728904.719:1092): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9124 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 652.821141] audit: type=1326 audit(1529728904.740:1093): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9123 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:44 executing program 1: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) 04:41:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) 04:41:45 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) 04:41:45 executing program 0: socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000100)={0x0, 0x0, 0x0, {}, {}, @ramp}) 04:41:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000180)) 04:41:45 executing program 7: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000040)) 04:41:45 executing program 1: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) 04:41:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, &(0x7f0000000140), 0x0, 0xfffffffffffffffe) 04:41:45 executing program 1: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) 04:41:45 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) llistxattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/105, 0x69) 04:41:45 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) 04:41:45 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000100)={'icmp6\x00'}, &(0x7f0000000180)=0x1e) 04:41:45 executing program 7: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000040)) 04:41:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000180)) 04:41:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, &(0x7f0000000140), 0x0, 0xfffffffffffffffe) [ 653.778319] audit: type=1326 audit(1529728905.777:1094): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9180 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:45 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) 04:41:45 executing program 7: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000040)) 04:41:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50211}]}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000180)) [ 653.860451] audit: type=1326 audit(1529728905.850:1095): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9189 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:45 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) 04:41:46 executing program 0: socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000100)={0x0, 0x0, 0x0, {}, {}, @ramp}) 04:41:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50211}]}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000180)) 04:41:46 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, &(0x7f0000000140), 0x0, 0xfffffffffffffffe) 04:41:46 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) 04:41:46 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000040)) 04:41:46 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) 04:41:46 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) llistxattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/105, 0x69) 04:41:46 executing program 0: socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000100)={0x0, 0x0, 0x0, {}, {}, @ramp}) 04:41:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50211}]}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000180)) 04:41:46 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) 04:41:46 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) 04:41:46 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000040)) 04:41:46 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, &(0x7f0000000140), 0x0, 0xfffffffffffffffe) 04:41:46 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000100)={'icmp6\x00'}, &(0x7f0000000180)=0x1e) [ 654.803579] audit: type=1326 audit(1529728906.802:1096): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9243 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:46 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000100)={0x0, 0x0, 0x0, {}, {}, @ramp}) 04:41:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) 04:41:46 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000040)) 04:41:46 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) 04:41:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000180)) 04:41:46 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, &(0x7f0000000140), 0x0, 0xfffffffffffffffe) [ 654.869583] audit: type=1326 audit(1529728906.823:1097): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9245 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 655.003333] audit: type=1326 audit(1529728906.992:1098): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9259 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:47 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) 04:41:47 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000040)) 04:41:47 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) 04:41:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) 04:41:47 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000100)={0x0, 0x0, 0x0, {}, {}, @ramp}) 04:41:47 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, &(0x7f0000000140), 0x0, 0xfffffffffffffffe) 04:41:47 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000040)) 04:41:47 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f0000000100)=""/28) 04:41:47 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0xffffffff}, 0xc) signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) 04:41:47 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) 04:41:47 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000040)) 04:41:47 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000100)={0x0, 0x0, 0x0, {}, {}, @ramp}) 04:41:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) 04:41:47 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, &(0x7f0000000140), 0x0, 0xfffffffffffffffe) 04:41:47 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000180)) 04:41:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f0000000100)=""/28) 04:41:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) 04:41:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0xffffffff}, 0xc) signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) 04:41:48 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ad}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000040)) [ 656.080909] audit: type=1326 audit(1529728908.078:1099): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9320 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) 04:41:48 executing program 3: syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, &(0x7f0000000140), 0x0, 0xfffffffffffffffe) 04:41:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000100)={0x0, 0x0, 0x0, {}, {}, @ramp}) 04:41:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f0000000100)=""/28) 04:41:48 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ad}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000040)) 04:41:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) 04:41:48 executing program 3: syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, &(0x7f0000000140), 0x0, 0xfffffffffffffffe) 04:41:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) 04:41:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0xffffffff}, 0xc) signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) 04:41:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000100)={0x0, 0x0, 0x0, {}, {}, @ramp}) 04:41:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f0000000100)=""/28) 04:41:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000180)) 04:41:48 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ad}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000040)) 04:41:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) 04:41:48 executing program 3: syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, &(0x7f0000000140), 0x0, 0xfffffffffffffffe) 04:41:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) 04:41:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000100)={0x0, 0x0, 0x0, {}, {}, @ramp}) 04:41:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0xffffffff}, 0xc) signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) 04:41:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f0000000100)=""/28) [ 656.979813] audit: type=1326 audit(1529728908.978:1100): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9380 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f0000000100)=""/28) 04:41:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000100)={0x0, 0x0, 0x0, {}, {}, @ramp}) 04:41:49 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, &(0x7f0000000140), 0x0, 0xfffffffffffffffe) 04:41:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) 04:41:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000040)) 04:41:49 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) 04:41:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) 04:41:49 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, &(0x7f0000000140), 0x0, 0xfffffffffffffffe) 04:41:49 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) 04:41:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f0000000100)=""/28) 04:41:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000100)={0x0, 0x0, 0x0, {}, {}, @ramp}) 04:41:49 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) 04:41:49 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, &(0x7f0000000140), 0x0, 0xfffffffffffffffe) 04:41:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000140)) [ 657.955405] kauditd_printk_skb: 3 callbacks suppressed [ 657.955427] audit: type=1326 audit(1529728909.953:1104): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9427 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, &(0x7f0000000140), 0x0, 0xfffffffffffffffe) 04:41:50 executing program 5: accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f0000000100)=""/28) 04:41:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000100)={0x0, 0x0, 0x0, {}, {}, @ramp}) 04:41:50 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) 04:41:50 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000040)) 04:41:50 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5021b}]}) pipe2(&(0x7f0000000180), 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000380)) 04:41:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000100)={0x0, 0x0, 0x0, {}, {}, @ramp}) 04:41:50 executing program 5: accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f0000000100)=""/28) 04:41:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) 04:41:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, &(0x7f0000000140), 0x0, 0xfffffffffffffffe) [ 658.295586] audit: type=1326 audit(1529728910.294:1105): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9458 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 658.409713] audit: type=1326 audit(1529728910.408:1106): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9467 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 658.473134] audit: type=1326 audit(1529728910.459:1107): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9471 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:50 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) 04:41:50 executing program 4: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0xffffffff}, 0xc) signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) 04:41:50 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) pkey_alloc(0x0, 0x0) pkey_alloc(0x0, 0x0) 04:41:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, &(0x7f0000000140), 0x0, 0xfffffffffffffffe) 04:41:50 executing program 5: accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f0000000100)=""/28) [ 658.872517] audit: type=1326 audit(1529728910.871:1108): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9480 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:50 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f0000000100)=""/28) 04:41:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, &(0x7f0000000140), 0x0, 0xfffffffffffffffe) 04:41:50 executing program 4: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0xffffffff}, 0xc) signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) 04:41:51 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) pkey_alloc(0x0, 0x0) pkey_alloc(0x0, 0x0) 04:41:51 executing program 4: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0xffffffff}, 0xc) signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) 04:41:51 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000040)) 04:41:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, &(0x7f0000000140), 0x0, 0xfffffffffffffffe) [ 659.271071] audit: type=1326 audit(1529728911.269:1109): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9513 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:51 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000100)={0x0, 0x0, 0x0, {}, {}, @ramp}) 04:41:51 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f0000000100)=""/28) 04:41:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) 04:41:51 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0xffffffff}, 0xc) signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) [ 659.387178] audit: type=1326 audit(1529728911.384:1110): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9523 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 659.455679] audit: type=1326 audit(1529728911.453:1111): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9528 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:51 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) pkey_alloc(0x0, 0x0) pkey_alloc(0x0, 0x0) 04:41:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, &(0x7f0000000140), 0x0, 0xfffffffffffffffe) 04:41:51 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f0000000100)=""/28) 04:41:51 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0xffffffff}, 0xc) signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) 04:41:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000040), 0x8) 04:41:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f0000000100)=""/28) 04:41:51 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0xffffffff}, 0xc) signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) 04:41:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, &(0x7f0000000140), 0x0, 0xfffffffffffffffe) 04:41:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000040), 0x8) 04:41:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) pkey_alloc(0x0, 0x0) pkey_alloc(0x0, 0x0) [ 659.976993] audit: type=1326 audit(1529728911.975:1112): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9548 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0xffffffff}, 0xc) signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) 04:41:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) pkey_alloc(0x0, 0x0) 04:41:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000100)={0x0, 0x0, 0x0, {}, {}, @ramp}) 04:41:52 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000040), 0x8) 04:41:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) pkey_alloc(0x0, 0x0) 04:41:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f0000000100)=""/28) 04:41:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000100)={'ip6_vti0\x00'}) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000180)) 04:41:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0xffffffff}, 0xc) signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) 04:41:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000280)=""/150) [ 660.349514] audit: type=1326 audit(1529728912.347:1113): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9575 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:52 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000040), 0x8) 04:41:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0xffffffff}, 0xc) signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) 04:41:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f0000000100)=""/28) 04:41:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) pkey_alloc(0x0, 0x0) 04:41:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f0000000100)=""/28) 04:41:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, &(0x7f0000000140), 0x0, 0xfffffffffffffffe) 04:41:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000280)=""/150) 04:41:52 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000040), 0x8) 04:41:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0xffffffff}, 0xc) signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) 04:41:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000280)=""/150) 04:41:53 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0xffffffff}, 0xc) signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) 04:41:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f0000000100)=""/28) 04:41:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x0, 0x0) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000200)) 04:41:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000040), 0x8) 04:41:53 executing program 6: pkey_alloc(0x0, 0x0) pkey_alloc(0x0, 0x0) 04:41:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) readlinkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=""/113, 0x71) 04:41:53 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0xffffffff}, 0xc) signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) 04:41:53 executing program 6: pkey_alloc(0x0, 0x0) pkey_alloc(0x0, 0x0) 04:41:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f0000000100)=""/28) 04:41:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000040), 0x8) 04:41:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000280)=""/150) 04:41:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, &(0x7f0000000140), 0x0, 0xfffffffffffffffe) 04:41:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x0, 0x0) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000200)) 04:41:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) socket$key(0xf, 0x3, 0x2) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000000c0)) 04:41:53 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0xffffffff}, 0xc) signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) 04:41:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f0000000100)=""/28) 04:41:53 executing program 6: pkey_alloc(0x0, 0x0) pkey_alloc(0x0, 0x0) 04:41:53 executing program 1: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000040), 0x8) 04:41:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000280)=""/150) 04:41:53 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) pkey_alloc(0x0, 0x0) pkey_alloc(0x0, 0x0) 04:41:53 executing program 1: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000040), 0x8) 04:41:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x0, 0x0) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000200)) 04:41:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000280)=""/150) 04:41:54 executing program 1: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000040), 0x8) 04:41:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz0\x00', 0x1ff) 04:41:54 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) pkey_alloc(0x0, 0x0) pkey_alloc(0x0, 0x0) 04:41:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x0, 0x0) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000200)) 04:41:54 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0xffffffff}, 0xc) signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) 04:41:54 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000040), 0x8) 04:41:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000280)=""/150) 04:41:54 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) pkey_alloc(0x0, 0x0) pkey_alloc(0x0, 0x0) 04:41:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz0\x00', 0x1ff) 04:41:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000480)=[{0x6, 0x0, 0x0, 0x5008e}]}) syz_open_procfs(0x0, &(0x7f0000000080)='net/sco\x00') ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 04:41:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000200)) 04:41:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f0000000100)=""/28) 04:41:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz0\x00', 0x1ff) 04:41:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) pkey_alloc(0x0, 0x0) pkey_alloc(0x0, 0x0) 04:41:54 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000040), 0x8) 04:41:55 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000200)) 04:41:55 executing program 2: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000280)=""/150) 04:41:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000480)=[{0x6, 0x0, 0x0, 0x5008e}]}) syz_open_procfs(0x0, &(0x7f0000000080)='net/sco\x00') ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 04:41:55 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) pkey_alloc(0x0, 0x0) pkey_alloc(0x0, 0x0) 04:41:55 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000040), 0x8) 04:41:55 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0xffffffff}, 0xc) signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) 04:41:55 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz0\x00', 0x1ff) 04:41:55 executing program 2: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000280)=""/150) 04:41:55 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000200)) 04:41:55 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) pkey_alloc(0x0, 0x0) pkey_alloc(0x0, 0x0) 04:41:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000480)=[{0x6, 0x0, 0x0, 0x5008e}]}) syz_open_procfs(0x0, &(0x7f0000000080)='net/sco\x00') ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 04:41:55 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000040), 0x8) 04:41:55 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f0000000100)=""/28) [ 663.806597] kauditd_printk_skb: 6 callbacks suppressed [ 663.806619] audit: type=1326 audit(1529728915.805:1120): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9771 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:55 executing program 2: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000280)=""/150) [ 663.896488] audit: type=1326 audit(1529728915.849:1121): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9774 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:55 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ad}]}) pkey_alloc(0x0, 0x0) pkey_alloc(0x0, 0x0) 04:41:55 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000040), 0x8) 04:41:55 executing program 7: openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x0, 0x0) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000200)) 04:41:56 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz0\x00', 0x1ff) 04:41:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000480)=[{0x6, 0x0, 0x0, 0x5008e}]}) syz_open_procfs(0x0, &(0x7f0000000080)='net/sco\x00') ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 04:41:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000040), 0x8) 04:41:56 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ad}]}) pkey_alloc(0x0, 0x0) pkey_alloc(0x0, 0x0) 04:41:56 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ad}]}) pkey_alloc(0x0, 0x0) pkey_alloc(0x0, 0x0) 04:41:56 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000280)=""/150) 04:41:56 executing program 7: openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x0, 0x0) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000200)) 04:41:56 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz0\x00', 0x1ff) 04:41:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000480)=[{0x6, 0x0, 0x0, 0x5008e}]}) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 04:41:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000040), 0x8) 04:41:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f00000000c0)) 04:41:56 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:41:56 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000280)=""/150) 04:41:56 executing program 7: openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x0, 0x0) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000200)) 04:41:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000480)=[{0x6, 0x0, 0x0, 0x5008e}]}) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 04:41:56 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz0\x00', 0x1ff) 04:41:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000040), 0x8) 04:41:56 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) pkey_alloc(0x0, 0x0) pkey_alloc(0x0, 0x0) 04:41:57 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x0, 0x0) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000200)) 04:41:57 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000280)=""/150) [ 665.027528] audit: type=1326 audit(1529728917.026:1122): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9852 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f00000000c0)) 04:41:57 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz0\x00', 0x1ff) 04:41:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:41:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000480)=[{0x6, 0x0, 0x0, 0x5008e}]}) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 04:41:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000040), 0x8) 04:41:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000280)=""/150) 04:41:57 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x0, 0x0) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000200)) 04:41:57 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz0\x00', 0x1ff) 04:41:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f00000000c0)) 04:41:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000040), 0x8) 04:41:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:41:57 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='net/sco\x00') ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 04:41:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000280)=""/150) [ 665.480015] audit: type=1326 audit(1529728917.478:1123): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9892 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) pkey_alloc(0x0, 0x0) pkey_alloc(0x0, 0x0) 04:41:57 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x0, 0x0) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000200)) 04:41:57 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz0\x00', 0x1ff) 04:41:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f00000000c0)) 04:41:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000280)=""/150) 04:41:57 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='net/sco\x00') ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 04:41:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:41:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x0, 0x0) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000200)) [ 665.997724] audit: type=1326 audit(1529728917.996:1124): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9922 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ad}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000280)=""/150) 04:41:58 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz0\x00', 0x1ff) 04:41:58 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='net/sco\x00') ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 04:41:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:41:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000040), 0x8) 04:41:58 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f00000000c0)) 04:41:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x0, 0x0) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000200)) 04:41:58 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz0\x00', 0x1ff) [ 666.428360] audit: type=1326 audit(1529728918.426:1125): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9953 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) pkey_alloc(0x0, 0x0) pkey_alloc(0x0, 0x0) 04:41:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ad}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000280)=""/150) 04:41:58 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000480)=[{0x6, 0x0, 0x0, 0x5008e}]}) syz_open_procfs(0x0, &(0x7f0000000080)='net/sco\x00') ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 04:41:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:41:58 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz0\x00', 0x1ff) 04:41:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x0, 0x0) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000200)) 04:41:58 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f00000000c0)) [ 666.962384] audit: type=1326 audit(1529728918.961:1126): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9972 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz0\x00', 0x1ff) 04:41:59 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000480)=[{0x6, 0x0, 0x0, 0x5008e}]}) syz_open_procfs(0x0, &(0x7f0000000080)='net/sco\x00') ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 04:41:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ad}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000280)=""/150) 04:41:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x0, 0x0) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000200)) 04:41:59 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f00000000c0)) 04:41:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000040), 0x8) 04:41:59 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:41:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz0\x00', 0x1ff) 04:41:59 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000480)=[{0x6, 0x0, 0x0, 0x5008e}]}) syz_open_procfs(0x0, &(0x7f0000000080)='net/sco\x00') ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) [ 667.368689] audit: type=1326 audit(1529728919.367:1127): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10003 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:41:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x0, 0x0) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000200)) 04:41:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000280)=""/150) 04:41:59 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f00000000c0)) 04:41:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000480)}) syz_open_procfs(0x0, &(0x7f0000000080)='net/sco\x00') ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 04:41:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz0\x00', 0x1ff) 04:41:59 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000100)) shmat(0xffffffffffffffff, &(0x7f0000ffb000/0x4000)=nil, 0x0) 04:41:59 executing program 5: accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) [ 667.927610] audit: type=1326 audit(1529728919.926:1128): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10016 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:00 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz0\x00', 0x1ff) 04:42:00 executing program 5: accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:42:00 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x0, 0x0) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000200)) 04:42:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000480)}) syz_open_procfs(0x0, &(0x7f0000000080)='net/sco\x00') ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 04:42:00 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f00000000c0)) 04:42:00 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x0, 0x0) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000200)) 04:42:00 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000100)) shmat(0xffffffffffffffff, &(0x7f0000ffb000/0x4000)=nil, 0x0) 04:42:00 executing program 5: accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:42:00 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f00000000c0)) 04:42:00 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz0\x00', 0x1ff) [ 668.342086] audit: type=1326 audit(1529728920.340:1129): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10048 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000280)=""/150) 04:42:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000480)}) syz_open_procfs(0x0, &(0x7f0000000080)='net/sco\x00') ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 04:42:00 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 04:42:00 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f00000000c0)) 04:42:00 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000100)) shmat(0xffffffffffffffff, &(0x7f0000ffb000/0x4000)=nil, 0x0) 04:42:00 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz0\x00', 0x1ff) 04:42:00 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) [ 668.901914] audit: type=1326 audit(1529728920.900:1130): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10076 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x0, 0x5008e}]}) syz_open_procfs(0x0, &(0x7f0000000080)='net/sco\x00') ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 04:42:01 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:42:01 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000100)) shmat(0xffffffffffffffff, &(0x7f0000ffb000/0x4000)=nil, 0x0) 04:42:01 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f00000000c0)) 04:42:01 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x0, 0x0) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000200)) 04:42:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x0, 0x5008e}]}) syz_open_procfs(0x0, &(0x7f0000000080)='net/sco\x00') ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 04:42:01 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 04:42:01 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:42:01 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz0\x00', 0x1ff) [ 669.374581] audit: type=1326 audit(1529728921.373:1131): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10100 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 669.436232] audit: type=1326 audit(1529728921.405:1132): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10096 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000280)=""/150) 04:42:01 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f00000000c0)) 04:42:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:42:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x0, 0x5008e}]}) syz_open_procfs(0x0, &(0x7f0000000080)='net/sco\x00') ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 04:42:01 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) shmat(0xffffffffffffffff, &(0x7f0000ffb000/0x4000)=nil, 0x0) 04:42:01 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) [ 669.884370] audit: type=1326 audit(1529728921.883:1133): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10123 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000480)=[{0x6}]}) syz_open_procfs(0x0, &(0x7f0000000080)='net/sco\x00') ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 04:42:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:42:01 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f00000000c0)) 04:42:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) shmat(0xffffffffffffffff, &(0x7f0000ffb000/0x4000)=nil, 0x0) 04:42:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) [ 670.117836] audit: type=1326 audit(1529728922.116:1134): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10131 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:02 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x0, 0x0) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000200)) 04:42:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) shmat(0xffffffffffffffff, &(0x7f0000ffb000/0x4000)=nil, 0x0) 04:42:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:42:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f00000000c0)) 04:42:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz0\x00', 0x1ff) [ 670.377102] audit: type=1326 audit(1529728922.375:1135): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10150 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 670.462287] audit: type=1326 audit(1529728922.429:1136): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10154 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:02 executing program 6: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000100)) shmat(0xffffffffffffffff, &(0x7f0000ffb000/0x4000)=nil, 0x0) 04:42:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 04:42:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f00000000c0)) 04:42:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:42:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) getuid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000002c0)) 04:42:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:42:03 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000480)=[{0x6}]}) syz_open_procfs(0x0, &(0x7f0000000080)='net/sco\x00') ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 04:42:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f00000000c0)) 04:42:03 executing program 6: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000100)) shmat(0xffffffffffffffff, &(0x7f0000ffb000/0x4000)=nil, 0x0) 04:42:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 04:42:03 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) [ 671.125378] audit: type=1326 audit(1529728923.123:1137): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10188 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz0\x00', 0x1ff) 04:42:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) 04:42:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f00000000c0)) 04:42:03 executing program 6: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000100)) shmat(0xffffffffffffffff, &(0x7f0000ffb000/0x4000)=nil, 0x0) 04:42:03 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:42:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 04:42:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000001c0), 0x0, 0x0) [ 671.360722] audit: type=1326 audit(1529728923.355:1138): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10204 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:03 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000100)) shmat(0xffffffffffffffff, &(0x7f0000ffb000/0x4000)=nil, 0x0) [ 671.434889] audit: type=1326 audit(1529728923.420:1139): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10206 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f00000000c0)) 04:42:03 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 04:42:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000001c0), 0x0, 0x0) 04:42:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000480)=[{0x6}]}) syz_open_procfs(0x0, &(0x7f0000000080)='net/sco\x00') ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 04:42:04 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000100)) shmat(0xffffffffffffffff, &(0x7f0000ffb000/0x4000)=nil, 0x0) 04:42:04 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) syz_fuse_mount(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:42:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f00000000c0)) 04:42:04 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 04:42:04 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) syz_fuse_mount(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:42:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000001c0), 0x0, 0x0) 04:42:04 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 04:42:04 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000100)) shmat(0xffffffffffffffff, &(0x7f0000ffb000/0x4000)=nil, 0x0) 04:42:04 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:42:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 04:42:04 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 04:42:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000100)) shmat(0xffffffffffffffff, &(0x7f0000ffb000/0x4000)=nil, 0x0) 04:42:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000001c0), 0x0, 0x0) 04:42:04 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) syz_fuse_mount(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:42:04 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 04:42:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f00000000c0)) 04:42:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000100)) shmat(0xffffffffffffffff, &(0x7f0000ffb000/0x4000)=nil, 0x0) 04:42:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000001c0), 0x0, 0x0) 04:42:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 04:42:04 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 04:42:04 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) syz_fuse_mount(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:42:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) creat(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000000)) 04:42:05 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000100)) shmat(0xffffffffffffffff, &(0x7f0000ffb000/0x4000)=nil, 0x0) 04:42:05 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 04:42:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:42:05 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000100)) shmat(0xffffffffffffffff, &(0x7f0000ffb000/0x4000)=nil, 0x0) 04:42:05 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000001c0), 0x0, 0x0) 04:42:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) syz_fuse_mount(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:42:05 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 04:42:05 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 04:42:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) creat(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000000)) 04:42:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f00000000c0)) 04:42:05 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000100)) shmat(0xffffffffffffffff, &(0x7f0000ffb000/0x4000)=nil, 0x0) 04:42:05 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 04:42:05 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000001c0), 0x0, 0x0) 04:42:05 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 04:42:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) creat(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000000)) 04:42:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) syz_fuse_mount(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:42:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) [ 673.994283] kauditd_printk_skb: 5 callbacks suppressed [ 673.994305] audit: type=1326 audit(1529728925.993:1145): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10353 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:06 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) creat(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000000)) 04:42:06 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000000)) 04:42:06 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 04:42:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) syz_fuse_mount(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:42:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 04:42:06 executing program 7: mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000001c0), 0x0, 0x0) 04:42:06 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000100)) shmat(0xffffffffffffffff, &(0x7f0000ffb000/0x4000)=nil, 0x0) 04:42:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f00000000c0), &(0x7f0000000100)=0x1) syncfs(0xffffffffffffffff) 04:42:06 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000000)) 04:42:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 04:42:06 executing program 7: mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000001c0), 0x0, 0x0) 04:42:06 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 04:42:06 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000100)) shmat(0xffffffffffffffff, &(0x7f0000ffb000/0x4000)=nil, 0x0) 04:42:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) recvmmsg(0xffffffffffffffff, &(0x7f0000001300), 0x0, 0x0, &(0x7f0000001340)={0x0, 0x1c9c380}) 04:42:06 executing program 2: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) syz_fuse_mount(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:42:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f00000000c0), &(0x7f0000000100)=0x1) syncfs(0xffffffffffffffff) [ 674.944006] audit: type=1326 audit(1529728926.933:1146): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10402 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:07 executing program 7: mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000001c0), 0x0, 0x0) 04:42:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 04:42:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 04:42:07 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000000)) 04:42:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f00000000c0), &(0x7f0000000100)=0x1) syncfs(0xffffffffffffffff) 04:42:07 executing program 2: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) syz_fuse_mount(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 675.126314] audit: type=1326 audit(1529728927.125:1147): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10416 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:07 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000001c0), 0x0, 0x0) 04:42:07 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) sendto$inet6(r0, &(0x7f00007a8fff), 0x0, 0xfffffefffffffffe, &(0x7f000006ffe4)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 04:42:07 executing program 2: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) syz_fuse_mount(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:42:07 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000000)) 04:42:07 executing program 0: fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 04:42:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f00000000c0), &(0x7f0000000100)=0x1) syncfs(0xffffffffffffffff) 04:42:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000100)) shmat(0xffffffffffffffff, &(0x7f0000ffb000/0x4000)=nil, 0x0) 04:42:07 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000001c0), 0x0, 0x0) 04:42:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000180)) 04:42:07 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) syz_fuse_mount(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:42:07 executing program 0: fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) [ 675.883295] audit: type=1326 audit(1529728927.882:1148): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10456 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 04:42:08 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000000)) 04:42:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) syncfs(0xffffffffffffffff) 04:42:08 executing program 0: fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 04:42:08 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) syz_fuse_mount(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:42:08 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000001c0), 0x0, 0x0) 04:42:08 executing program 4: [ 676.090175] audit: type=1326 audit(1529728928.088:1149): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10481 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000001c0), 0x0, 0x0) 04:42:08 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) syz_fuse_mount(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:42:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100), 0xc) 04:42:08 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 04:42:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000100)) shmat(0xffffffffffffffff, &(0x7f0000ffb000/0x4000)=nil, 0x0) 04:42:08 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000000)) 04:42:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) syncfs(0xffffffffffffffff) 04:42:08 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 04:42:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000001c0), 0x0, 0x0) [ 676.840474] audit: type=1326 audit(1529728928.839:1150): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10515 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 04:42:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000080)}) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a}, &(0x7f0000000340), 0x0, 0xfffffffffffffffc) 04:42:08 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 04:42:08 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) creat(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000000)) 04:42:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) syz_fuse_mount(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:42:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000001c0), 0x0, 0x0) 04:42:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) syncfs(0xffffffffffffffff) [ 677.041603] audit: type=1326 audit(1529728929.040:1151): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10524 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:09 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) creat(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000000)) 04:42:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000300)}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 04:42:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) syz_fuse_mount(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:42:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000001c0), 0x0, 0x0) 04:42:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) syz_fuse_mount(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:42:09 executing program 5: getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f00000000c0), &(0x7f0000000100)=0x1) syncfs(0xffffffffffffffff) 04:42:09 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) creat(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000000)) 04:42:09 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000080)}) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a}, &(0x7f0000000340), 0x0, 0xfffffffffffffffc) 04:42:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000300)}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 04:42:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) semctl$GETPID(0x0, 0x0, 0xb, &(0x7f0000000300)=""/194) 04:42:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000300)}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 04:42:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000001c0), 0x0, 0x0) 04:42:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) semctl$GETPID(0x0, 0x0, 0xb, &(0x7f0000000300)=""/194) 04:42:09 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) creat(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000000)) 04:42:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) syz_fuse_mount(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:42:09 executing program 5: getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f00000000c0), &(0x7f0000000100)=0x1) syncfs(0xffffffffffffffff) 04:42:09 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000080)}) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a}, &(0x7f0000000340), 0x0, 0xfffffffffffffffc) 04:42:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x0, 0x0) 04:42:10 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000001c0), 0x0, 0x0) 04:42:10 executing program 5: getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f00000000c0), &(0x7f0000000100)=0x1) syncfs(0xffffffffffffffff) 04:42:10 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x50355}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 04:42:10 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) creat(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000000)) 04:42:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) syz_fuse_mount(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:42:10 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x0, 0x0) 04:42:10 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000080)}) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a}, &(0x7f0000000340), 0x0, 0xfffffffffffffffc) 04:42:10 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) semctl$GETPID(0x0, 0x0, 0xb, &(0x7f0000000300)=""/194) 04:42:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) syz_fuse_mount(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:42:10 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000001c0), 0x0, 0x0) 04:42:10 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f00000000c0), &(0x7f0000000100)=0x1) syncfs(0xffffffffffffffff) 04:42:10 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x50355}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 04:42:10 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) creat(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000000)) [ 678.466478] audit: type=1326 audit(1529728930.465:1152): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10626 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:10 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a}, &(0x7f0000000340), 0x0, 0xfffffffffffffffc) 04:42:10 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) semctl$GETPID(0x0, 0x0, 0xb, &(0x7f0000000300)=""/194) 04:42:10 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x0, 0x0) 04:42:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) syz_fuse_mount(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:42:10 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x50355}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 04:42:10 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ad}]}) creat(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000000)) 04:42:10 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f00000000c0), &(0x7f0000000100)=0x1) syncfs(0xffffffffffffffff) [ 678.685085] audit: type=1326 audit(1529728930.683:1153): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10645 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:10 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a}, &(0x7f0000000340), 0x0, 0xfffffffffffffffc) 04:42:10 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 04:42:10 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f00000000c0), &(0x7f0000000100)=0x1) syncfs(0xffffffffffffffff) 04:42:10 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) semctl$GETPID(0x0, 0x0, 0xb, &(0x7f0000000300)=""/194) 04:42:10 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ad}]}) creat(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000000)) [ 678.922951] audit: type=1326 audit(1529728930.921:1154): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10665 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a}, &(0x7f0000000340), 0x0, 0xfffffffffffffffc) 04:42:11 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f00000000c0), &(0x7f0000000100)=0x1) syncfs(0xffffffffffffffff) 04:42:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x0, 0x0) 04:42:11 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000001c0), 0x0, 0x0) 04:42:11 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ad}]}) creat(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000000)) 04:42:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) semctl$GETPID(0x0, 0x0, 0xb, &(0x7f0000000300)=""/194) [ 679.420004] audit: type=1326 audit(1529728931.418:1155): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10686 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:11 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f00000000c0), &(0x7f0000000100)=0x1) syncfs(0xffffffffffffffff) 04:42:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) syz_fuse_mount(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:42:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) semctl$GETPID(0x0, 0x0, 0xb, &(0x7f0000000300)=""/194) 04:42:11 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000080)}) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a}, &(0x7f0000000340), 0x0, 0xfffffffffffffffc) 04:42:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x0, 0x0) 04:42:11 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) creat(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000000)) [ 679.666970] audit: type=1326 audit(1529728931.665:1156): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10701 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 679.722585] audit: type=1326 audit(1529728931.717:1157): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10704 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:11 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 04:42:11 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f00000000c0), &(0x7f0000000100)=0x1) syncfs(0xffffffffffffffff) 04:42:11 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000080)}) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a}, &(0x7f0000000340), 0x0, 0xfffffffffffffffc) 04:42:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x0, 0x0) 04:42:11 executing program 6: openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) semctl$GETPID(0x0, 0x0, 0xb, &(0x7f0000000300)=""/194) [ 679.883864] audit: type=1326 audit(1529728931.882:1158): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10720 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:12 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000001c0), 0x0, 0x0) 04:42:12 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000080)}) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a}, &(0x7f0000000340), 0x0, 0xfffffffffffffffc) 04:42:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f00000000c0), &(0x7f0000000100)=0x1) syncfs(0xffffffffffffffff) 04:42:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x0, 0x0) 04:42:12 executing program 6: openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) semctl$GETPID(0x0, 0x0, 0xb, &(0x7f0000000300)=""/194) 04:42:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f00000000c0), &(0x7f0000000100)=0x1) syncfs(0xffffffffffffffff) [ 680.377793] audit: type=1326 audit(1529728932.376:1159): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10729 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) syz_fuse_mount(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:42:12 executing program 6: openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) semctl$GETPID(0x0, 0x0, 0xb, &(0x7f0000000300)=""/194) 04:42:12 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000080)}) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a}, &(0x7f0000000340), 0x0, 0xfffffffffffffffc) 04:42:12 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x0, 0x0) 04:42:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f00000000c0), &(0x7f0000000100)=0x1) syncfs(0xffffffffffffffff) [ 680.645262] audit: type=1326 audit(1529728932.643:1160): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10757 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 04:42:12 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) creat(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000000)) 04:42:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f00000000c0), &(0x7f0000000100)=0x1) syncfs(0xffffffffffffffff) 04:42:12 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x0, 0x0) 04:42:12 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) semctl$GETPID(0x0, 0x0, 0xb, &(0x7f0000000300)=""/194) [ 680.806112] audit: type=1326 audit(1529728932.804:1161): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10765 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 680.848133] audit: type=1326 audit(1529728932.828:1162): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10766 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 680.868108] audit: type=1326 audit(1529728932.845:1163): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10772 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:13 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) semctl$GETPID(0x0, 0x0, 0xb, &(0x7f0000000300)=""/194) 04:42:13 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x0, 0x0) 04:42:13 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000080)}) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a}, &(0x7f0000000340), 0x0, 0xfffffffffffffffc) 04:42:13 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) semctl$GETPID(0x0, 0x0, 0xb, &(0x7f0000000300)=""/194) 04:42:13 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000080)}) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a}, &(0x7f0000000340), 0x0, 0xfffffffffffffffc) 04:42:13 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x0, 0x0) 04:42:13 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x0, 0x0) 04:42:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) semctl$GETPID(0x0, 0x0, 0xb, &(0x7f0000000300)=""/194) 04:42:13 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000080)}) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a}, &(0x7f0000000340), 0x0, 0xfffffffffffffffc) 04:42:13 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x0, 0x0) 04:42:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) semctl$GETPID(0x0, 0x0, 0xb, &(0x7f0000000300)=""/194) 04:42:13 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f00000000c0), &(0x7f0000000100)=0x1) syncfs(0xffffffffffffffff) 04:42:13 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000080)}) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a}, &(0x7f0000000340), 0x0, 0xfffffffffffffffc) 04:42:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x0, 0x0) 04:42:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) semctl$GETPID(0x0, 0x0, 0xb, &(0x7f0000000300)=""/194) 04:42:13 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) creat(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000000)) 04:42:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x0, 0x0) [ 681.825454] audit: type=1326 audit(1529728933.824:1164): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10823 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:13 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000080)}) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a}, &(0x7f0000000340), 0x0, 0xfffffffffffffffc) 04:42:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) semctl$GETPID(0x0, 0x0, 0xb, &(0x7f0000000300)=""/194) 04:42:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x0, 0x0) 04:42:14 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) semctl$GETPID(0x0, 0x0, 0xb, &(0x7f0000000300)=""/194) 04:42:14 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000080)}) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a}, &(0x7f0000000340), 0x0, 0xfffffffffffffffc) 04:42:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x0, 0x0) 04:42:14 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) semctl$GETPID(0x0, 0x0, 0xb, &(0x7f0000000300)=""/194) 04:42:14 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000080)}) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a}, &(0x7f0000000340), 0x0, 0xfffffffffffffffc) 04:42:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x0, 0x0) 04:42:14 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000080)}) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a}, &(0x7f0000000340), 0x0, 0xfffffffffffffffc) 04:42:14 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f00000000c0), &(0x7f0000000100)=0x1) syncfs(0xffffffffffffffff) 04:42:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x0, 0x0) 04:42:14 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) semctl$GETPID(0x0, 0x0, 0xb, &(0x7f0000000300)=""/194) 04:42:14 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000080)}) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a}, &(0x7f0000000340), 0x0, 0xfffffffffffffffc) 04:42:14 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000140)=@generic) 04:42:14 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)="76656e6f00855fdb7a7cbc7c4e88517cdc77c0e4b623514082e84ae5442b4706c73c680832cfe4165d3ac3052c30df5016d2c4e836a6f5baa3def384dbe5ec369fa963598f37c69126c165c6838da3f9018768aca4495c6a8084fde0142c48058ad1354b28e14318792cf7514621c8589c9929ec14067b235a866ad6a2a4ae6a85a72ee96a23e15156cc449d84515b95cf6919b8b47ed716185477370b50a751699427fe1eca598c4cf0f5440e70fabafaa1685bcbb6cba3b796e2373bfd7dacd89ec1", 0xc3) 04:42:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000140)) 04:42:14 executing program 3: 04:42:14 executing program 3: 04:42:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x0, 0x0) 04:42:14 executing program 0: 04:42:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000140)) 04:42:15 executing program 0: 04:42:15 executing program 3: 04:42:15 executing program 7: 04:42:15 executing program 0: 04:42:15 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) semctl$GETPID(0x0, 0x0, 0xb, &(0x7f0000000300)=""/194) 04:42:15 executing program 3: 04:42:15 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer2\x00', 0x0, 0x0) 04:42:15 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000080)}) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a}, &(0x7f0000000340), 0x0, 0xfffffffffffffffc) 04:42:15 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000100)='keyring\x00') 04:42:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000140)) 04:42:15 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f00000000c0)) 04:42:15 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) getitimer(0x0, &(0x7f0000000080)) 04:42:15 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000080)="a9281b45725281207792bd047010df89", 0x10) 04:42:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x0, 0x0) 04:42:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000140)) 04:42:15 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 04:42:16 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f00000000c0)) 04:42:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) getitimer(0x0, &(0x7f0000000080)) 04:42:16 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) prctl$intptr(0x0, 0x0) 04:42:16 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000140)=""/164) 04:42:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) semctl$GETPID(0x0, 0x0, 0xb, &(0x7f0000000300)=""/194) 04:42:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000140)) 04:42:16 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f00000000c0)) 04:42:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000080)}) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a}, &(0x7f0000000340), 0x0, 0xfffffffffffffffc) 04:42:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) getitimer(0x0, &(0x7f0000000080)) 04:42:16 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) prctl$intptr(0x0, 0x0) 04:42:16 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000140)=""/164) [ 684.674258] kauditd_printk_skb: 8 callbacks suppressed [ 684.674281] audit: type=1326 audit(1529728936.673:1173): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10975 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 684.749713] audit: type=1326 audit(1529728936.748:1174): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10977 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000140)) 04:42:16 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f00000000c0)) 04:42:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x0, 0x0) 04:42:16 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000140)=""/164) 04:42:16 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) prctl$intptr(0x0, 0x0) 04:42:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) getitimer(0x0, &(0x7f0000000080)) 04:42:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000140)) [ 685.017973] audit: type=1326 audit(1529728937.015:1175): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10998 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:17 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f00000000c0)) 04:42:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000140)=""/164) 04:42:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000140)=""/164) 04:42:17 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) getitimer(0x0, &(0x7f0000000080)) 04:42:17 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) prctl$intptr(0x0, 0x0) 04:42:17 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f00000000c0)) 04:42:17 executing program 2: socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000140)) 04:42:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpu.stat\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)) 04:42:17 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) getitimer(0x0, &(0x7f0000000080)) 04:42:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) prctl$setptracer(0x59616d61, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) 04:42:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000140)=""/164) 04:42:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpu.stat\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)) 04:42:17 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) getitimer(0x0, &(0x7f0000000080)) 04:42:17 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f00000000c0)) 04:42:17 executing program 2: socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000140)) 04:42:17 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) prctl$intptr(0x0, 0x0) 04:42:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x0, 0x0) 04:42:18 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000140)=""/164) 04:42:18 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50192}]}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') 04:42:18 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) getitimer(0x0, &(0x7f0000000080)) 04:42:18 executing program 2: socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000140)) 04:42:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) prctl$intptr(0x0, 0x0) 04:42:18 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f00000000c0)) 04:42:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpu.stat\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)) 04:42:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x0, 0x0) 04:42:18 executing program 0: shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000140)=""/164) 04:42:18 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x161, &(0x7f0000000040)}) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000), 0x4) 04:42:18 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) getitimer(0x0, &(0x7f0000000080)) 04:42:18 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f00000000c0)) 04:42:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) prctl$intptr(0x0, 0x0) 04:42:18 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000140)) 04:42:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpu.stat\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)) 04:42:18 executing program 0: shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000140)=""/164) 04:42:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x0, 0x0) 04:42:18 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f00000000c0)) 04:42:18 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) getitimer(0x0, &(0x7f0000000080)) 04:42:18 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x161, &(0x7f0000000040)}) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000), 0x4) 04:42:18 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000140)) 04:42:18 executing program 7: socket$inet_tcp(0x2, 0x1, 0x0) prctl$intptr(0x0, 0x0) 04:42:18 executing program 0: shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000140)=""/164) 04:42:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)) 04:42:18 executing program 7: socket$inet_tcp(0x2, 0x1, 0x0) prctl$intptr(0x0, 0x0) 04:42:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x0, 0x0) 04:42:18 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f00000000c0)) 04:42:18 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x161, &(0x7f0000000040)}) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000), 0x4) 04:42:18 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) getitimer(0x0, &(0x7f0000000080)) 04:42:19 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000140)) 04:42:19 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000140)=""/164) 04:42:19 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)) 04:42:19 executing program 7: socket$inet_tcp(0x2, 0x1, 0x0) prctl$intptr(0x0, 0x0) 04:42:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x0, 0x0) 04:42:19 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f00000000c0)) 04:42:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000140)) 04:42:19 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000140)=""/164) 04:42:19 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) getitimer(0x0, &(0x7f0000000080)) 04:42:19 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x161, &(0x7f0000000040)}) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000), 0x4) 04:42:19 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) prctl$intptr(0x0, 0x0) 04:42:19 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f00000000c0)) 04:42:19 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)) 04:42:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x0, 0x0) 04:42:19 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) getitimer(0x0, &(0x7f0000000080)) 04:42:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000140)) 04:42:19 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000140)=""/164) 04:42:19 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000), 0x4) 04:42:19 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) prctl$intptr(0x0, 0x0) 04:42:19 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpu.stat\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)) 04:42:19 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f00000000c0)) 04:42:19 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) getitimer(0x0, &(0x7f0000000080)) 04:42:19 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000140)=""/164) 04:42:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x0, 0x0) 04:42:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000140)) 04:42:19 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000), 0x4) 04:42:19 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) prctl$intptr(0x0, 0x0) 04:42:19 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f00000000c0)) 04:42:19 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpu.stat\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)) 04:42:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) getitimer(0x0, &(0x7f0000000080)) 04:42:20 executing program 1: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x0, 0x0) 04:42:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000140)=""/164) 04:42:20 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f00000000c0)) 04:42:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000140)) 04:42:20 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$inet_tcp(0x2, 0x1, 0x0) prctl$intptr(0x0, 0x0) 04:42:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000), 0x4) 04:42:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) getitimer(0x0, &(0x7f0000000080)) 04:42:20 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpu.stat\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)) 04:42:20 executing program 1: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x0, 0x0) 04:42:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000140)=""/164) 04:42:20 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f00000000c0)) 04:42:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000140)) 04:42:20 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$inet_tcp(0x2, 0x1, 0x0) prctl$intptr(0x0, 0x0) 04:42:20 executing program 1: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x0, 0x0) 04:42:20 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpu.stat\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)) 04:42:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) getitimer(0x0, &(0x7f0000000080)) 04:42:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000140)=""/164) 04:42:20 executing program 4: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x161, &(0x7f0000000040)}) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000), 0x4) 04:42:20 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f00000000c0)) 04:42:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000140)) 04:42:20 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x0, 0x0) 04:42:20 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpu.stat\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)) 04:42:20 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$inet_tcp(0x2, 0x1, 0x0) prctl$intptr(0x0, 0x0) 04:42:20 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f00000000c0)) 04:42:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) getitimer(0x0, &(0x7f0000000080)) 04:42:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000140)=""/164) 04:42:20 executing program 4: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x161, &(0x7f0000000040)}) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000), 0x4) 04:42:20 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) prctl$intptr(0x0, 0x0) 04:42:20 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpu.stat\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)) 04:42:20 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x0, 0x0) 04:42:20 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f00000000c0)) 04:42:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000140)) 04:42:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) getitimer(0x0, &(0x7f0000000080)) 04:42:21 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000140)=""/164) [ 689.040826] audit: type=1326 audit(1529728941.039:1176): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11338 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:21 executing program 4: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x161, &(0x7f0000000040)}) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000), 0x4) 04:42:21 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) prctl$intptr(0x0, 0x0) [ 689.152443] audit: type=1326 audit(1529728941.103:1177): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11347 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:21 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpu.stat\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)) 04:42:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) getitimer(0x0, &(0x7f0000000080)) 04:42:21 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x0, 0x0) 04:42:21 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x161, &(0x7f0000000040)}) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000), 0x4) 04:42:21 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000140)=""/164) [ 689.331845] audit: type=1326 audit(1529728941.330:1178): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11369 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x0, 0x0) 04:42:21 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) prctl$intptr(0x0, 0x0) 04:42:21 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpu.stat\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)) [ 689.429454] audit: type=1326 audit(1529728941.410:1179): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11375 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:21 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x161, &(0x7f0000000040)}) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000), 0x4) 04:42:21 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpu.stat\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)) 04:42:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f00000000c0)) 04:42:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000140)) 04:42:21 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) prctl$intptr(0x0, 0x0) 04:42:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x0, 0x0) 04:42:21 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x161, &(0x7f0000000040)}) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000), 0x4) 04:42:21 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpu.stat\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)) [ 689.949392] audit: type=1326 audit(1529728941.948:1180): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11401 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 690.037481] audit: type=1326 audit(1529728942.035:1181): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11408 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x0, 0x0) [ 690.089764] audit: type=1326 audit(1529728942.056:1182): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11403 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x161, &(0x7f0000000040)}) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000), 0x4) 04:42:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) getitimer(0x0, &(0x7f0000000080)) 04:42:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpu.stat\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)) 04:42:22 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000140)=""/164) 04:42:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x0, 0x0) 04:42:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x161, &(0x7f0000000040)}) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000), 0x4) [ 690.267065] audit: type=1326 audit(1529728942.265:1183): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11425 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpu.stat\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)) 04:42:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x0, 0x0) 04:42:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpu.stat\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)) [ 690.390825] audit: type=1326 audit(1529728942.389:1184): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11434 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 690.502914] audit: type=1326 audit(1529728942.501:1185): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11442 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x161, &(0x7f0000000040)}) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000), 0x4) 04:42:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000140)) 04:42:22 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) prctl$intptr(0x0, 0x0) 04:42:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f00000000c0)) 04:42:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x0, 0x0) 04:42:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x161, &(0x7f0000000040)}) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000), 0x4) [ 690.964310] audit: type=1326 audit(1529728942.963:1186): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11456 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:23 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x161, &(0x7f0000000040)}) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000), 0x4) 04:42:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x0, 0x0) [ 691.042205] audit: type=1326 audit(1529728943.010:1187): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11459 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 691.062254] audit: type=1326 audit(1529728943.020:1188): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11460 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 691.126639] audit: type=1326 audit(1529728943.125:1189): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11472 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) getitimer(0x0, &(0x7f0000000080)) 04:42:23 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x161, &(0x7f0000000040)}) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000), 0x4) 04:42:23 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000140)=""/164) 04:42:23 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x161, &(0x7f0000000040)}) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000), 0x4) 04:42:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpu.stat\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)) 04:42:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, &(0x7f0000000140)) 04:42:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000000)={@dev={0xac, 0x14, 0x14}, @multicast2=0xe0000002}, 0x10) 04:42:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) prctl$intptr(0x0, 0x0) 04:42:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, &(0x7f0000000140)) 04:42:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x0, 0x0) 04:42:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000000c0)=""/99, 0x63, 0x0, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) 04:42:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000000)={@dev={0xac, 0x14, 0x14}, @multicast2=0xe0000002}, 0x10) 04:42:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, &(0x7f0000000140)) 04:42:24 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x161, &(0x7f0000000040)}) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000), 0x4) 04:42:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 04:42:24 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpu.stat\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)) 04:42:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000000)={@dev={0xac, 0x14, 0x14}, @multicast2=0xe0000002}, 0x10) 04:42:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000000c0)=""/99, 0x63, 0x0, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) 04:42:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 04:42:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, &(0x7f0000000140)) 04:42:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000000)={@dev={0xac, 0x14, 0x14}, @multicast2=0xe0000002}, 0x10) 04:42:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000000c0)=""/99, 0x63, 0x0, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) 04:42:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 04:42:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000000)={@dev={0xac, 0x14, 0x14}, @multicast2=0xe0000002}, 0x10) 04:42:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, &(0x7f0000000140)) 04:42:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 04:42:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x0, 0x0) 04:42:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) keyctl$link(0x8, 0x0, 0x0) 04:42:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000000c0)=""/99, 0x63, 0x0, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) 04:42:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x161, &(0x7f0000000040)}) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000), 0x4) 04:42:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000000)={@dev={0xac, 0x14, 0x14}, @multicast2=0xe0000002}, 0x10) 04:42:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000000)={@dev={0xac, 0x14, 0x14}, @multicast2=0xe0000002}, 0x10) 04:42:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, &(0x7f0000000140)) 04:42:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 04:42:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) keyctl$link(0x8, 0x0, 0x0) 04:42:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) recvfrom$unix(0xffffffffffffffff, &(0x7f00000000c0)=""/99, 0x63, 0x0, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) 04:42:25 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) faccessat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) 04:42:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) recvfrom$unix(0xffffffffffffffff, &(0x7f00000000c0)=""/99, 0x63, 0x0, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) 04:42:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) keyctl$link(0x8, 0x0, 0x0) 04:42:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 04:42:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, &(0x7f0000000140)) 04:42:25 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000000)={@dev={0xac, 0x14, 0x14}, @multicast2=0xe0000002}, 0x10) 04:42:26 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 04:42:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) faccessat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) 04:42:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) recvfrom$unix(0xffffffffffffffff, &(0x7f00000000c0)=""/99, 0x63, 0x0, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) 04:42:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) faccessat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) 04:42:26 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, &(0x7f0000000140)) 04:42:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) keyctl$link(0x8, 0x0, 0x0) 04:42:26 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000000)={@dev={0xac, 0x14, 0x14}, @multicast2=0xe0000002}, 0x10) 04:42:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]}) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000440)) 04:42:26 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000000c0)=""/99, 0x63, 0x0, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) 04:42:26 executing program 0: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 04:42:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) creat(&(0x7f0000000140)='./file0\x00', 0x0) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000200)='./file0\x00') 04:42:26 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000000c0)=""/99, 0x63, 0x0, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) 04:42:26 executing program 0: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 04:42:26 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, &(0x7f0000000140)) 04:42:26 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000000)={@dev={0xac, 0x14, 0x14}, @multicast2=0xe0000002}, 0x10) 04:42:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) faccessat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) 04:42:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) keyctl$link(0x8, 0x0, 0x0) 04:42:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]}) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000440)) 04:42:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) creat(&(0x7f0000000140)='./file0\x00', 0x0) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000200)='./file0\x00') 04:42:26 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000000c0)=""/99, 0x63, 0x0, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) 04:42:26 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000000)={@dev={0xac, 0x14, 0x14}, @multicast2=0xe0000002}, 0x10) 04:42:26 executing program 0: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 04:42:26 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, &(0x7f0000000140)) 04:42:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) keyctl$link(0x8, 0x0, 0x0) 04:42:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) faccessat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) 04:42:26 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000000c0)=""/99, 0x63, 0x0, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) 04:42:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]}) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000440)) 04:42:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) creat(&(0x7f0000000140)='./file0\x00', 0x0) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000200)='./file0\x00') 04:42:26 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000000)={@dev={0xac, 0x14, 0x14}, @multicast2=0xe0000002}, 0x10) 04:42:26 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 04:42:26 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, &(0x7f0000000140)) 04:42:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) keyctl$link(0x8, 0x0, 0x0) 04:42:27 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000000c0)=""/99, 0x63, 0x0, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) 04:42:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) faccessat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) 04:42:27 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000000)={@dev={0xac, 0x14, 0x14}, @multicast2=0xe0000002}, 0x10) 04:42:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) creat(&(0x7f0000000140)='./file0\x00', 0x0) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000200)='./file0\x00') 04:42:27 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, &(0x7f0000000140)) 04:42:27 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 04:42:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]}) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000440)) 04:42:27 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000000c0)=""/99, 0x63, 0x0, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) 04:42:27 executing program 7: socket$inet_tcp(0x2, 0x1, 0x0) keyctl$link(0x8, 0x0, 0x0) 04:42:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) faccessat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) 04:42:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000000)={@dev={0xac, 0x14, 0x14}, @multicast2=0xe0000002}, 0x10) 04:42:27 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 04:42:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000002c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000000c0)=""/99, 0x63, 0x0, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) 04:42:27 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, &(0x7f0000000140)) 04:42:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000200)='./file0\x00') 04:42:27 executing program 7: socket$inet_tcp(0x2, 0x1, 0x0) keyctl$link(0x8, 0x0, 0x0) 04:42:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]}) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000440)) 04:42:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000000)={@dev={0xac, 0x14, 0x14}, @multicast2=0xe0000002}, 0x10) 04:42:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, &(0x7f0000000140)) 04:42:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000002c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000000c0)=""/99, 0x63, 0x0, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) 04:42:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 04:42:27 executing program 6: fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) faccessat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) 04:42:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000200)='./file0\x00') 04:42:27 executing program 7: socket$inet_tcp(0x2, 0x1, 0x0) keyctl$link(0x8, 0x0, 0x0) 04:42:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]}) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000440)) 04:42:27 executing program 6: fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) faccessat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) 04:42:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000002c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000000c0)=""/99, 0x63, 0x0, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) 04:42:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, &(0x7f0000000140)) 04:42:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000000)={@dev={0xac, 0x14, 0x14}, @multicast2=0xe0000002}, 0x10) 04:42:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 04:42:27 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) keyctl$link(0x8, 0x0, 0x0) 04:42:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000200)='./file0\x00') 04:42:28 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) keyctl$link(0x8, 0x0, 0x0) 04:42:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]}) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000440)) 04:42:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000000c0)=""/99, 0x63, 0x0, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) 04:42:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, &(0x7f0000000140)) 04:42:28 executing program 6: fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) faccessat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) 04:42:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 04:42:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000000)={@dev={0xac, 0x14, 0x14}, @multicast2=0xe0000002}, 0x10) 04:42:28 executing program 4: creat(&(0x7f0000000140)='./file0\x00', 0x0) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000200)='./file0\x00') 04:42:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, &(0x7f0000000140)) 04:42:28 executing program 1: ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000440)) 04:42:28 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) keyctl$link(0x8, 0x0, 0x0) 04:42:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000000c0)=""/99, 0x63, 0x0, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) 04:42:28 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) faccessat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) 04:42:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 04:42:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000000)={@dev={0xac, 0x14, 0x14}, @multicast2=0xe0000002}, 0x10) 04:42:28 executing program 4: creat(&(0x7f0000000140)='./file0\x00', 0x0) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000200)='./file0\x00') 04:42:28 executing program 1: ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000440)) 04:42:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$inet_tcp(0x2, 0x1, 0x0) keyctl$link(0x8, 0x0, 0x0) 04:42:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, &(0x7f0000000140)) 04:42:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000000c0)=""/99, 0x63, 0x0, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) 04:42:28 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) faccessat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) 04:42:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 04:42:28 executing program 4: creat(&(0x7f0000000140)='./file0\x00', 0x0) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000200)='./file0\x00') 04:42:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000000)={@dev={0xac, 0x14, 0x14}, @multicast2=0xe0000002}, 0x10) 04:42:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$inet_tcp(0x2, 0x1, 0x0) keyctl$link(0x8, 0x0, 0x0) 04:42:28 executing program 1: ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000440)) 04:42:28 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) faccessat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) 04:42:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, &(0x7f0000000140)) 04:42:29 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) creat(&(0x7f0000000140)='./file0\x00', 0x0) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000200)='./file0\x00') 04:42:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 04:42:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000000c0)=""/99, 0x63, 0x0, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) 04:42:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000000)={@dev={0xac, 0x14, 0x14}, @multicast2=0xe0000002}, 0x10) 04:42:29 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]}) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000440)) [ 697.095700] kauditd_printk_skb: 10 callbacks suppressed [ 697.095722] audit: type=1326 audit(1529728949.094:1200): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11914 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$inet_tcp(0x2, 0x1, 0x0) keyctl$link(0x8, 0x0, 0x0) 04:42:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) faccessat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) 04:42:29 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, &(0x7f0000000140)) [ 697.207229] audit: type=1326 audit(1529728949.162:1201): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11922 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 04:42:29 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]}) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000440)) 04:42:29 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) creat(&(0x7f0000000140)='./file0\x00', 0x0) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000200)='./file0\x00') 04:42:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) keyctl$link(0x8, 0x0, 0x0) [ 697.327748] audit: type=1326 audit(1529728949.319:1202): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11937 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) faccessat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) [ 697.414651] audit: type=1326 audit(1529728949.369:1203): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11938 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) keyctl$link(0x8, 0x0, 0x0) 04:42:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) faccessat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) 04:42:29 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]}) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000440)) 04:42:29 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) creat(&(0x7f0000000140)='./file0\x00', 0x0) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000200)='./file0\x00') 04:42:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) faccessat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) 04:42:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000440)) 04:42:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000000)={@dev={0xac, 0x14, 0x14}, @multicast2=0xe0000002}, 0x10) 04:42:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000000c0)=""/99, 0x63, 0x0, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) 04:42:30 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) faccessat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) 04:42:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) creat(&(0x7f0000000140)='./file0\x00', 0x0) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000200)='./file0\x00') [ 698.085125] audit: type=1326 audit(1529728950.083:1204): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11979 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 698.127327] audit: type=1326 audit(1529728950.111:1205): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11985 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:30 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000440)) 04:42:30 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 04:42:30 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, &(0x7f0000000140)) 04:42:30 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) faccessat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) 04:42:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) creat(&(0x7f0000000140)='./file0\x00', 0x0) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000200)='./file0\x00') 04:42:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) keyctl$link(0x8, 0x0, 0x0) 04:42:30 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000440)) [ 698.307481] audit: type=1326 audit(1529728950.301:1206): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11997 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) keyctl$link(0x8, 0x0, 0x0) 04:42:30 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) faccessat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) 04:42:30 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50358}]}) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000440)) 04:42:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) creat(&(0x7f0000000140)='./file0\x00', 0x0) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000200)='./file0\x00') [ 698.395953] audit: type=1326 audit(1529728950.363:1207): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12005 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 698.451917] audit: type=1326 audit(1529728950.429:1208): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12011 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 698.471871] audit: type=1326 audit(1529728950.445:1209): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12012 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ad}]}) creat(&(0x7f0000000140)='./file0\x00', 0x0) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000200)='./file0\x00') 04:42:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000000)={@dev={0xac, 0x14, 0x14}, @multicast2=0xe0000002}, 0x10) 04:42:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50358}]}) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000440)) 04:42:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ad}]}) creat(&(0x7f0000000140)='./file0\x00', 0x0) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000200)='./file0\x00') 04:42:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000000c0)=""/99, 0x63, 0x0, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) 04:42:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ad}]}) creat(&(0x7f0000000140)='./file0\x00', 0x0) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000200)='./file0\x00') 04:42:31 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 04:42:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50358}]}) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000440)) 04:42:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) creat(&(0x7f0000000140)='./file0\x00', 0x0) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000200)='./file0\x00') 04:42:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, &(0x7f0000000140)) 04:42:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000440)) 04:42:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) keyctl$link(0x8, 0x0, 0x0) 04:42:31 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) faccessat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) 04:42:32 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) accept$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) perf_event_open$cgroup(&(0x7f00000007c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:42:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) 04:42:32 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) accept$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) perf_event_open$cgroup(&(0x7f00000007c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:42:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) 04:42:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) epoll_create(0x0) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x0) 04:42:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) creat(&(0x7f0000000140)='./file0\x00', 0x0) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000200)='./file0\x00') 04:42:32 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) shmctl$SHM_LOCK(0x0, 0xb) 04:42:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000440)) 04:42:32 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) accept$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) perf_event_open$cgroup(&(0x7f00000007c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:42:32 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) faccessat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) 04:42:32 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) keyctl$link(0x8, 0x0, 0x0) 04:42:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) 04:42:32 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) shmctl$SHM_LOCK(0x0, 0xb) 04:42:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) epoll_create(0x0) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x0) 04:42:32 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) accept$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) perf_event_open$cgroup(&(0x7f00000007c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:42:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'veth1_to_team\x00'}) 04:42:32 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) shmctl$SHM_LOCK(0x0, 0xb) 04:42:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) epoll_create(0x0) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x0) 04:42:32 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) perf_event_open$cgroup(&(0x7f00000007c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:42:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) epoll_create(0x0) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x0) 04:42:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5035a}]}) socket$nl_generic(0x10, 0x3, 0x10) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000080)) 04:42:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) creat(&(0x7f0000000140)='./file0\x00', 0x0) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000200)='./file0\x00') 04:42:33 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) perf_event_open$cgroup(&(0x7f00000007c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:42:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000440)) 04:42:33 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) shmctl$SHM_LOCK(0x0, 0xb) 04:42:33 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) perf_event_open$cgroup(&(0x7f00000007c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:42:33 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 04:42:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x0) 04:42:33 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5035a}]}) socket$nl_generic(0x10, 0x3, 0x10) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000080)) 04:42:33 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/91) 04:42:33 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) shmctl$SHM_LOCK(0x0, 0xb) 04:42:33 executing program 3: accept$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) perf_event_open$cgroup(&(0x7f00000007c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:42:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x0) 04:42:33 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5035a}]}) socket$nl_generic(0x10, 0x3, 0x10) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000080)) 04:42:33 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 04:42:33 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/91) 04:42:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x0) 04:42:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5035a}]}) socket$nl_generic(0x10, 0x3, 0x10) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000080)) 04:42:34 executing program 2: epoll_create(0x0) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x0) 04:42:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5035a}]}) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000080)) 04:42:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) shmctl$SHM_LOCK(0x0, 0xb) 04:42:34 executing program 3: accept$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) perf_event_open$cgroup(&(0x7f00000007c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:42:34 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 04:42:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/91) 04:42:34 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) getpgrp(0xffffffffffffffff) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) 04:42:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f00000000c0)) 04:42:34 executing program 2: epoll_create(0x0) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x0) 04:42:34 executing program 2: epoll_create(0x0) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x0) 04:42:34 executing program 3: accept$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) perf_event_open$cgroup(&(0x7f00000007c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:42:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5035a}]}) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000080)) 04:42:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) shmctl$SHM_LOCK(0x0, 0xb) 04:42:34 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 04:42:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/91) 04:42:34 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) getpgrp(0xffffffffffffffff) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) 04:42:34 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) epoll_create(0x0) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x0) 04:42:34 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) accept$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) perf_event_open$cgroup(&(0x7f00000007c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:42:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502b8}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)={@local}, &(0x7f0000000080)=0x14) 04:42:34 executing program 0: fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) shmctl$SHM_LOCK(0x0, 0xb) 04:42:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5035a}]}) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000080)) 04:42:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) uname(&(0x7f0000000040)=""/91) 04:42:34 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 04:42:34 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) getpgrp(0xffffffffffffffff) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) 04:42:34 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) epoll_create(0x0) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x0) 04:42:34 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) accept$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) perf_event_open$cgroup(&(0x7f00000007c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:42:35 executing program 0: fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) shmctl$SHM_LOCK(0x0, 0xb) 04:42:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502b8}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)={@local}, &(0x7f0000000080)=0x14) 04:42:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 04:42:35 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000080)) 04:42:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) uname(&(0x7f0000000040)=""/91) 04:42:35 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) epoll_create(0x0) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x0) 04:42:35 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) accept$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) perf_event_open$cgroup(&(0x7f00000007c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:42:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) getpgrp(0xffffffffffffffff) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) 04:42:35 executing program 0: fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) shmctl$SHM_LOCK(0x0, 0xb) 04:42:35 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) shmctl$SHM_LOCK(0x0, 0xb) 04:42:35 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000080)) 04:42:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 04:42:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502b8}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)={@local}, &(0x7f0000000080)=0x14) 04:42:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) epoll_create(0x0) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x0) 04:42:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) accept$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) perf_event_open$cgroup(&(0x7f00000007c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:42:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) uname(&(0x7f0000000040)=""/91) 04:42:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) 04:42:35 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) shmctl$SHM_LOCK(0x0, 0xb) 04:42:35 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000080)) 04:42:35 executing program 6: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 04:42:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) epoll_create(0x0) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x0) 04:42:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502b8}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)={@local}, &(0x7f0000000080)=0x14) 04:42:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) accept$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) perf_event_open$cgroup(&(0x7f00000007c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:42:35 executing program 7: openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/91) 04:42:35 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) shmctl$SHM_LOCK(0x0, 0xb) 04:42:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) 04:42:35 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5035a}]}) socket$nl_generic(0x10, 0x3, 0x10) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000080)) 04:42:35 executing program 6: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 04:42:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) epoll_create(0x0) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x0) 04:42:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) accept$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) perf_event_open$cgroup(&(0x7f00000007c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:42:36 executing program 7: openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/91) 04:42:36 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) shmctl$SHM_LOCK(0x0, 0xb) 04:42:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502b8}]}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)={@local}, &(0x7f0000000080)=0x14) 04:42:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x50215}]}) epoll_create(0x0) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x0) 04:42:36 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5035a}]}) socket$nl_generic(0x10, 0x3, 0x10) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000080)) 04:42:36 executing program 6: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 04:42:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) 04:42:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]}) accept$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) perf_event_open$cgroup(&(0x7f00000007c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:42:36 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) shmctl$SHM_LOCK(0x0, 0xb) 04:42:36 executing program 7: openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/91) 04:42:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502b8}]}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)={@local}, &(0x7f0000000080)=0x14) 04:42:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x50215}]}) epoll_create(0x0) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x0) 04:42:36 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5035a}]}) socket$nl_generic(0x10, 0x3, 0x10) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000080)) 04:42:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]}) accept$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) perf_event_open$cgroup(&(0x7f00000007c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:42:36 executing program 4: getpgrp(0xffffffffffffffff) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) 04:42:36 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 04:42:36 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/91) 04:42:36 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) shmctl$SHM_LOCK(0x0, 0xb) 04:42:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502b8}]}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)={@local}, &(0x7f0000000080)=0x14) 04:42:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x50215}]}) epoll_create(0x0) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x0) 04:42:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]}) accept$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) perf_event_open$cgroup(&(0x7f00000007c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:42:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) socket$nl_generic(0x10, 0x3, 0x10) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000080)) 04:42:36 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/91) 04:42:36 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 04:42:36 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) shmctl$SHM_LOCK(0x0, 0xb) 04:42:36 executing program 4: getpgrp(0xffffffffffffffff) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) 04:42:36 executing program 1: socket$inet6(0xa, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)={@local}, &(0x7f0000000080)=0x14) 04:42:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) socket$nl_generic(0x10, 0x3, 0x10) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000080)) 04:42:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) accept$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) perf_event_open$cgroup(&(0x7f00000007c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:42:36 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/91) 04:42:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) epoll_create(0x0) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x0) 04:42:36 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 04:42:36 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) shmctl$SHM_LOCK(0x0, 0xb) 04:42:37 executing program 4: getpgrp(0xffffffffffffffff) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) [ 705.050649] kauditd_printk_skb: 14 callbacks suppressed [ 705.050672] audit: type=1326 audit(1529728957.049:1224): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12461 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:37 executing program 1: socket$inet6(0xa, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)={@local}, &(0x7f0000000080)=0x14) 04:42:37 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) socket$nl_generic(0x10, 0x3, 0x10) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000080)) [ 705.135342] audit: type=1326 audit(1529728957.086:1225): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12464 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 04:42:37 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/91) 04:42:37 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) shmctl$SHM_LOCK(0x0, 0xb) 04:42:37 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) getpgrp(0xffffffffffffffff) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) 04:42:37 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5035a}]}) socket$nl_generic(0x10, 0x3, 0x10) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000080)) 04:42:37 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) shmctl$SHM_LOCK(0x0, 0xb) 04:42:37 executing program 1: socket$inet6(0xa, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)={@local}, &(0x7f0000000080)=0x14) 04:42:37 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/91) [ 705.487296] audit: type=1326 audit(1529728957.481:1226): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12502 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 04:42:37 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) accept$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) perf_event_open$cgroup(&(0x7f00000007c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:42:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) epoll_create(0x0) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x0) 04:42:37 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502b8}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)={@local}, &(0x7f0000000080)=0x14) 04:42:37 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/91) 04:42:37 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5035a}]}) socket$nl_generic(0x10, 0x3, 0x10) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000080)) 04:42:37 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) getpgrp(0xffffffffffffffff) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) 04:42:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) [ 705.962560] audit: type=1326 audit(1529728957.961:1227): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12520 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:38 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) getpgrp(0xffffffffffffffff) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) [ 706.057724] audit: type=1326 audit(1529728958.056:1228): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12533 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/91) 04:42:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5035a}]}) socket$nl_generic(0x10, 0x3, 0x10) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000080)) 04:42:38 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502b8}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)={@local}, &(0x7f0000000080)=0x14) 04:42:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 04:42:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) shmctl$SHM_LOCK(0x0, 0xb) 04:42:38 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) getpgrp(0xffffffffffffffff) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) 04:42:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/91) 04:42:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) [ 706.466211] audit: type=1326 audit(1529728958.464:1229): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12568 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) accept$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) perf_event_open$cgroup(&(0x7f00000007c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 706.881116] audit: type=1326 audit(1529728958.879:1230): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12576 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) epoll_create(0x0) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x0) 04:42:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) socket$nl_generic(0x10, 0x3, 0x10) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000080)) 04:42:38 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502b8}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)={@local}, &(0x7f0000000080)=0x14) 04:42:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 04:42:38 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) getpgrp(0xffffffffffffffff) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) 04:42:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/91) [ 706.987646] audit: type=1326 audit(1529728958.986:1231): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12580 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/91) 04:42:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) [ 707.052223] audit: type=1326 audit(1529728959.015:1232): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12588 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) getpgrp(0xffffffffffffffff) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) 04:42:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)}) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)={@local}, &(0x7f0000000080)=0x14) 04:42:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50211}]}) getpgrp(0xffffffffffffffff) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) [ 707.173217] audit: type=1326 audit(1529728959.117:1233): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12595 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50211}]}) getpgrp(0xffffffffffffffff) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) 04:42:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) shmctl$SHM_LOCK(0x0, 0xb) 04:42:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)}) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)={@local}, &(0x7f0000000080)=0x14) 04:42:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50211}]}) getpgrp(0xffffffffffffffff) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) 04:42:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) getpgrp(0xffffffffffffffff) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) 04:42:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)}) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)={@local}, &(0x7f0000000080)=0x14) 04:42:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 04:42:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) socket$nl_generic(0x10, 0x3, 0x10) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000080)) 04:42:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50192}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='numa_maps\x00') statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/8) 04:42:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/91) 04:42:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 04:42:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502b8}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)={@local}, &(0x7f0000000080)=0x14) 04:42:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 04:42:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50192}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='numa_maps\x00') statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/8) 04:42:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502b8}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)={@local}, &(0x7f0000000080)=0x14) 04:42:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 04:42:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50192}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='numa_maps\x00') statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/8) 04:42:40 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50345}]}) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000040)) getgid() 04:42:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502b8}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)={@local}, &(0x7f0000000080)=0x14) 04:42:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 04:42:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) getpgrp(0xffffffffffffffff) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) 04:42:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50192}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='numa_maps\x00') statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/8) 04:42:40 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50345}]}) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000040)) getgid() 04:42:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 04:42:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) socket$nl_generic(0x10, 0x3, 0x10) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000080)) 04:42:41 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/91) 04:42:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 04:42:41 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)={@local}, &(0x7f0000000080)=0x14) 04:42:41 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50345}]}) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000040)) getgid() 04:42:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50192}]}) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/8) 04:42:41 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 04:42:41 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50345}]}) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000040)) getgid() 04:42:41 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 04:42:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50192}]}) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/8) 04:42:41 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50345}]}) getgid() 04:42:41 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 04:42:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50192}]}) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/8) 04:42:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) getpgrp(0xffffffffffffffff) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) 04:42:41 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50345}]}) getgid() 04:42:41 executing program 3: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 04:42:41 executing program 3: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 04:42:42 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)={@local}, &(0x7f0000000080)=0x14) 04:42:42 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) 04:42:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) getpgid(0xffffffffffffffff) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000ac0)) 04:42:42 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50345}]}) getgid() 04:42:42 executing program 2: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='numa_maps\x00') statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/8) 04:42:42 executing program 3: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 04:42:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000180)) [ 710.153698] kauditd_printk_skb: 12 callbacks suppressed [ 710.153719] audit: type=1326 audit(1529728962.152:1246): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12767 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:42 executing program 2: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='numa_maps\x00') statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/8) 04:42:42 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 04:42:42 executing program 0: ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000040)) getgid() 04:42:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) 04:42:42 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) 04:42:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) 04:42:42 executing program 2: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='numa_maps\x00') statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/8) 04:42:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000180)) 04:42:42 executing program 0: ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000040)) getgid() 04:42:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x0) 04:42:43 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000180)) 04:42:43 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50192}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='numa_maps\x00') statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/8) 04:42:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) 04:42:43 executing program 0: ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000040)) getgid() 04:42:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)={@local}, &(0x7f0000000080)=0x14) 04:42:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) 04:42:43 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 04:42:43 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) [ 711.137599] audit: type=1326 audit(1529728963.136:1247): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12839 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:43 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50345}]}) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000040)) getgid() 04:42:43 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50192}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='numa_maps\x00') statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/8) 04:42:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) 04:42:43 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000180)) 04:42:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) 04:42:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x0) 04:42:43 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50345}]}) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000040)) getgid() 04:42:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 04:42:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x0) 04:42:44 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50192}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='numa_maps\x00') statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/8) 04:42:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000180)) 04:42:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) 04:42:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) 04:42:44 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50345}]}) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000040)) getgid() 04:42:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 04:42:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) exit(0x0) 04:42:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000040)) getgid() 04:42:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 04:42:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='numa_maps\x00') statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/8) 04:42:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) 04:42:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x0) 04:42:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000180)) 04:42:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) 04:42:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000040)) getgid() 04:42:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 04:42:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='numa_maps\x00') statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/8) 04:42:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) exit(0x0) 04:42:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) 04:42:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x0) 04:42:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000180)) 04:42:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000040)) getgid() 04:42:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) 04:42:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 04:42:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='numa_maps\x00') statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/8) 04:42:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x0) 04:42:44 executing program 7: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) 04:42:44 executing program 6: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000180)) 04:42:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) exit(0x0) 04:42:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 04:42:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x50345}]}) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000040)) getgid() 04:42:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50192}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='numa_maps\x00') statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/8) 04:42:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) 04:42:45 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x0) 04:42:45 executing program 6: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000180)) 04:42:45 executing program 7: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) 04:42:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x50345}]}) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000040)) getgid() 04:42:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 04:42:45 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) exit(0x0) 04:42:45 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50192}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='numa_maps\x00') statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/8) [ 713.204112] audit: type=1326 audit(1529728965.202:1248): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12984 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:45 executing program 4: openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x0) 04:42:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) 04:42:45 executing program 7: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) 04:42:45 executing program 6: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000180)) 04:42:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x50345}]}) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000040)) getgid() 04:42:45 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50192}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='numa_maps\x00') statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/8) 04:42:45 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) exit(0x0) 04:42:45 executing program 4: openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x0) 04:42:45 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000180)) 04:42:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6}]}) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000040)) getgid() 04:42:45 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) 04:42:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) 04:42:45 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='numa_maps\x00') statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/8) [ 713.687822] audit: type=1326 audit(1529728965.686:1249): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13024 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 713.777218] audit: type=1326 audit(1529728965.754:1250): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13031 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:46 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 04:42:46 executing program 4: openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x0) 04:42:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) exit(0x0) 04:42:46 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000180)) 04:42:46 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) 04:42:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) [ 714.162314] audit: type=1326 audit(1529728966.161:1251): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13051 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:46 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) 04:42:46 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x0) 04:42:46 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000180)) 04:42:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) exit(0x0) 04:42:46 executing program 5: dup2(0xffffffffffffff9c, 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) 04:42:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000180)) 04:42:46 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6}]}) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000040)) getgid() 04:42:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) 04:42:46 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x0) 04:42:46 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='numa_maps\x00') statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/8) [ 714.606980] audit: type=1326 audit(1529728966.605:1252): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13083 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 714.689701] audit: type=1326 audit(1529728966.688:1253): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13088 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:47 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 04:42:47 executing program 1: openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) exit(0x0) 04:42:47 executing program 5: dup2(0xffffffffffffff9c, 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) 04:42:47 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000180)) 04:42:47 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) 04:42:47 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x0) 04:42:47 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) 04:42:47 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x0) [ 715.137999] audit: type=1326 audit(1529728967.136:1254): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13102 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:47 executing program 5: dup2(0xffffffffffffff9c, 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) 04:42:47 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000180)) 04:42:47 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) 04:42:47 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x0) 04:42:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6}]}) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000040)) getgid() 04:42:47 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000180)) 04:42:47 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) [ 715.547448] audit: type=1326 audit(1529728967.546:1255): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13131 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='numa_maps\x00') statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/8) [ 715.652685] audit: type=1326 audit(1529728967.651:1256): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13138 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:48 executing program 1: openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) exit(0x0) 04:42:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x0) 04:42:48 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) 04:42:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000180)) 04:42:48 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) 04:42:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) epoll_create(0x0) pipe(&(0x7f0000000000)) 04:42:48 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) 04:42:48 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) 04:42:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000180)) 04:42:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x0) 04:42:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x0) 04:42:48 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) [ 716.442461] audit: type=1326 audit(1529728968.441:1257): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13175 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x0) 04:42:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) epoll_create(0x0) pipe(&(0x7f0000000000)) 04:42:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) 04:42:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) 04:42:48 executing program 1: openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) exit(0x0) 04:42:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={0x0, {{0x2, 0x0, @multicast2=0xe0000002}}, {{0x2, 0x0, @loopback=0x7f000001}}}, 0x108) 04:42:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x0) 04:42:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) epoll_create(0x0) pipe(&(0x7f0000000000)) 04:42:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) 04:42:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) 04:42:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000180)) [ 716.920177] audit: type=1326 audit(1529728968.918:1258): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13194 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) [ 716.992581] audit: type=1326 audit(1529728968.951:1259): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13196 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) epoll_create(0x0) pipe(&(0x7f0000000000)) 04:42:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) 04:42:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) modify_ldt$read(0x0, &(0x7f0000003340), 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000140)=""/175, 0xaf, 0x0, &(0x7f0000004b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ac3d7971e84d"}, 0x14) 04:42:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) 04:42:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) 04:42:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) 04:42:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) pipe(&(0x7f0000000000)) [ 717.448514] audit: type=1326 audit(1529728969.446:1260): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13234 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) modify_ldt$read(0x0, &(0x7f0000003340), 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000140)=""/175, 0xaf, 0x0, &(0x7f0000004b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ac3d7971e84d"}, 0x14) 04:42:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) 04:42:49 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) exit(0x0) 04:42:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000180)) 04:42:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) 04:42:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) pipe(&(0x7f0000000000)) 04:42:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) 04:42:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) modify_ldt$read(0x0, &(0x7f0000003340), 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000140)=""/175, 0xaf, 0x0, &(0x7f0000004b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ac3d7971e84d"}, 0x14) 04:42:49 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x0) [ 717.907966] audit: type=1326 audit(1529728969.906:1261): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13253 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) pipe(&(0x7f0000000000)) 04:42:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) modify_ldt$read(0x0, &(0x7f0000003340), 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000140)=""/175, 0xaf, 0x0, &(0x7f0000004b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ac3d7971e84d"}, 0x14) 04:42:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) [ 717.980460] audit: type=1326 audit(1529728969.969:1262): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13263 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 718.000369] audit: type=1326 audit(1529728969.972:1263): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13261 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:50 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) 04:42:50 executing program 3: epoll_create(0x0) pipe(&(0x7f0000000000)) 04:42:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) 04:42:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000140)=""/175, 0xaf, 0x0, &(0x7f0000004b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ac3d7971e84d"}, 0x14) 04:42:50 executing program 3: epoll_create(0x0) pipe(&(0x7f0000000000)) [ 718.402651] audit: type=1326 audit(1529728970.400:1264): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13278 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000140)=""/175, 0xaf, 0x0, &(0x7f0000004b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ac3d7971e84d"}, 0x14) 04:42:50 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) exit(0x0) 04:42:50 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000180)) 04:42:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) 04:42:50 executing program 3: epoll_create(0x0) pipe(&(0x7f0000000000)) 04:42:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000140)=""/175, 0xaf, 0x0, &(0x7f0000004b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ac3d7971e84d"}, 0x14) 04:42:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) 04:42:50 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x0) 04:42:50 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) epoll_create(0x0) pipe(&(0x7f0000000000)) 04:42:51 executing program 0: modify_ldt$read(0x0, &(0x7f0000003340), 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000140)=""/175, 0xaf, 0x0, &(0x7f0000004b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ac3d7971e84d"}, 0x14) 04:42:51 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) 04:42:51 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) 04:42:51 executing program 0: modify_ldt$read(0x0, &(0x7f0000003340), 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000140)=""/175, 0xaf, 0x0, &(0x7f0000004b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ac3d7971e84d"}, 0x14) 04:42:51 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) epoll_create(0x0) pipe(&(0x7f0000000000)) 04:42:51 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) 04:42:51 executing program 0: modify_ldt$read(0x0, &(0x7f0000003340), 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000140)=""/175, 0xaf, 0x0, &(0x7f0000004b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ac3d7971e84d"}, 0x14) 04:42:51 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) 04:42:51 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) exit(0x0) 04:42:51 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000080)=""/10) 04:42:51 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) epoll_create(0x0) pipe(&(0x7f0000000000)) 04:42:51 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) 04:42:51 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) 04:42:51 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) modify_ldt$read(0x0, &(0x7f0000003340), 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000140)=""/175, 0xaf, 0x0, &(0x7f0000004b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ac3d7971e84d"}, 0x14) 04:42:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) 04:42:51 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) pipe(&(0x7f0000000000)) rt_sigtimedwait(&(0x7f0000000080), &(0x7f0000000100), &(0x7f0000000200), 0x8) 04:42:51 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) modify_ldt$read(0x0, &(0x7f0000003340), 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000140)=""/175, 0xaf, 0x0, &(0x7f0000004b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ac3d7971e84d"}, 0x14) 04:42:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) epoll_create(0x0) pipe(&(0x7f0000000000)) 04:42:52 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) 04:42:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) 04:42:52 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) modify_ldt$read(0x0, &(0x7f0000003340), 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000140)=""/175, 0xaf, 0x0, &(0x7f0000004b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ac3d7971e84d"}, 0x14) 04:42:52 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000080)=""/10) 04:42:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) epoll_create(0x0) pipe(&(0x7f0000000000)) 04:42:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) pipe(&(0x7f0000000000)) rt_sigtimedwait(&(0x7f0000000080), &(0x7f0000000100), &(0x7f0000000200), 0x8) 04:42:52 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) exit(0x0) 04:42:52 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) 04:42:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) modify_ldt$read(0x0, &(0x7f0000003340), 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000140)=""/175, 0xaf, 0x0, &(0x7f0000004b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ac3d7971e84d"}, 0x14) 04:42:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) epoll_create(0x0) pipe(&(0x7f0000000000)) 04:42:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) 04:42:52 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000080)=""/10) 04:42:52 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000080)=""/10) 04:42:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) pipe(&(0x7f0000000000)) rt_sigtimedwait(&(0x7f0000000080), &(0x7f0000000100), &(0x7f0000000200), 0x8) 04:42:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) 04:42:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) modify_ldt$read(0x0, &(0x7f0000003340), 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000140)=""/175, 0xaf, 0x0, &(0x7f0000004b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ac3d7971e84d"}, 0x14) 04:42:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x50215}]}) epoll_create(0x0) pipe(&(0x7f0000000000)) 04:42:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) 04:42:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) socket$packet(0x11, 0x0, 0x300) accept$inet(0xffffffffffffff9c, &(0x7f0000000100)={0x0, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) 04:42:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) modify_ldt$read(0x0, &(0x7f0000003340), 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000140)=""/175, 0xaf, 0x0, &(0x7f0000004b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ac3d7971e84d"}, 0x14) 04:42:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) 04:42:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) 04:42:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) exit(0x0) 04:42:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x50215}]}) epoll_create(0x0) pipe(&(0x7f0000000000)) 04:42:53 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000080)=""/10) 04:42:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) pipe(&(0x7f0000000000)) rt_sigtimedwait(&(0x7f0000000080), &(0x7f0000000100), &(0x7f0000000200), 0x8) 04:42:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) socket$packet(0x11, 0x0, 0x300) accept$inet(0xffffffffffffff9c, &(0x7f0000000100)={0x0, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) 04:42:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) modify_ldt$read(0x0, &(0x7f0000003340), 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000140)=""/175, 0xaf, 0x0, &(0x7f0000004b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ac3d7971e84d"}, 0x14) 04:42:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) 04:42:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) 04:42:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x50215}]}) epoll_create(0x0) pipe(&(0x7f0000000000)) 04:42:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) 04:42:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) modify_ldt$read(0x0, &(0x7f0000003340), 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000140)=""/175, 0xaf, 0x0, &(0x7f0000004b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ac3d7971e84d"}, 0x14) 04:42:53 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000080)=""/10) 04:42:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) socket$packet(0x11, 0x0, 0x300) accept$inet(0xffffffffffffff9c, &(0x7f0000000100)={0x0, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) 04:42:53 executing program 7: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) 04:42:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) rt_sigtimedwait(&(0x7f0000000080), &(0x7f0000000100), &(0x7f0000000200), 0x8) 04:42:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) epoll_create(0x0) pipe(&(0x7f0000000000)) [ 721.730368] kauditd_printk_skb: 4 callbacks suppressed [ 721.730391] audit: type=1326 audit(1529728973.728:1269): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13496 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:54 executing program 7: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) 04:42:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) socket$packet(0x11, 0x0, 0x300) accept$inet(0xffffffffffffff9c, &(0x7f0000000100)={0x0, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) 04:42:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) 04:42:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) rt_sigtimedwait(&(0x7f0000000080), &(0x7f0000000100), &(0x7f0000000200), 0x8) 04:42:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) modify_ldt$read(0x0, &(0x7f0000003340), 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000140)=""/175, 0xaf, 0x0, &(0x7f0000004b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ac3d7971e84d"}, 0x14) 04:42:54 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000080)=""/10) 04:42:54 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) exit(0x0) 04:42:54 executing program 7: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) 04:42:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) modify_ldt$read(0x0, &(0x7f0000003340), 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000140)=""/175, 0xaf, 0x0, &(0x7f0000004b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ac3d7971e84d"}, 0x14) 04:42:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) 04:42:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) accept$inet(0xffffffffffffff9c, &(0x7f0000000100)={0x0, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) 04:42:54 executing program 4: socket$inet6(0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000080)=""/10) 04:42:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) rt_sigtimedwait(&(0x7f0000000080), &(0x7f0000000100), &(0x7f0000000200), 0x8) 04:42:54 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) [ 722.404354] audit: type=1326 audit(1529728974.403:1270): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13525 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) [ 722.564531] audit: type=1326 audit(1529728974.562:1271): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13543 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) epoll_create(0x0) pipe(&(0x7f0000000000)) 04:42:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) accept$inet(0xffffffffffffff9c, &(0x7f0000000100)={0x0, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) [ 722.706970] audit: type=1326 audit(1529728974.705:1272): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13552 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:55 executing program 6: pipe(&(0x7f0000000000)) rt_sigtimedwait(&(0x7f0000000080), &(0x7f0000000100), &(0x7f0000000200), 0x8) 04:42:55 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) exit(0x0) 04:42:55 executing program 4: socket$inet6(0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000080)=""/10) 04:42:55 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) accept$inet(0xffffffffffffff9c, &(0x7f0000000100)={0x0, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) 04:42:55 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) 04:42:55 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) 04:42:55 executing program 4: socket$inet6(0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000080)=""/10) 04:42:55 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) 04:42:55 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) modify_ldt$read(0x0, &(0x7f0000003340), 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000140)=""/175, 0xaf, 0x0, &(0x7f0000004b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ac3d7971e84d"}, 0x14) 04:42:55 executing program 6: pipe(&(0x7f0000000000)) rt_sigtimedwait(&(0x7f0000000080), &(0x7f0000000100), &(0x7f0000000200), 0x8) 04:42:55 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000080)=""/10) 04:42:55 executing program 5: socket$packet(0x11, 0x0, 0x300) accept$inet(0xffffffffffffff9c, &(0x7f0000000100)={0x0, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) 04:42:55 executing program 5: socket$packet(0x11, 0x0, 0x300) accept$inet(0xffffffffffffff9c, &(0x7f0000000100)={0x0, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) [ 723.357481] audit: type=1326 audit(1529728975.356:1273): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13592 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) 04:42:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) epoll_create(0x0) pipe(&(0x7f0000000000)) 04:42:55 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) 04:42:55 executing program 6: pipe(&(0x7f0000000000)) rt_sigtimedwait(&(0x7f0000000080), &(0x7f0000000100), &(0x7f0000000200), 0x8) [ 723.558433] audit: type=1326 audit(1529728975.557:1274): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13604 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 723.644189] audit: type=1326 audit(1529728975.642:1275): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13607 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:55 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) exit(0x0) 04:42:55 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000080)=""/10) 04:42:55 executing program 5: socket$packet(0x11, 0x0, 0x300) accept$inet(0xffffffffffffff9c, &(0x7f0000000100)={0x0, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) 04:42:55 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) 04:42:55 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) pipe(&(0x7f0000000000)) rt_sigtimedwait(&(0x7f0000000080), &(0x7f0000000100), &(0x7f0000000200), 0x8) 04:42:55 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) socket$packet(0x11, 0x0, 0x300) accept$inet(0xffffffffffffff9c, &(0x7f0000000100)={0x0, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) 04:42:56 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) 04:42:56 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) modify_ldt$read(0x0, &(0x7f0000003340), 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000140)=""/175, 0xaf, 0x0, &(0x7f0000004b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ac3d7971e84d"}, 0x14) 04:42:56 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) pipe(&(0x7f0000000000)) rt_sigtimedwait(&(0x7f0000000080), &(0x7f0000000100), &(0x7f0000000200), 0x8) 04:42:56 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000080)=""/10) 04:42:56 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) socket$packet(0x11, 0x0, 0x300) accept$inet(0xffffffffffffff9c, &(0x7f0000000100)={0x0, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) 04:42:56 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) [ 724.316380] audit: type=1326 audit(1529728976.315:1276): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13640 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:56 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) 04:42:56 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) 04:42:56 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) 04:42:56 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) socket$inet6(0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000080)=""/10) [ 724.569870] audit: type=1326 audit(1529728976.568:1277): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13662 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 724.596210] audit: type=1326 audit(1529728976.592:1278): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13663 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:56 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501eb}]}) socket$packet(0x11, 0x0, 0x300) accept$inet(0xffffffffffffff9c, &(0x7f0000000100)={0x0, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) 04:42:56 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) socket$inet6(0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000080)=""/10) 04:42:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000100)={0x2}) 04:42:56 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) pipe(&(0x7f0000000000)) rt_sigtimedwait(&(0x7f0000000080), &(0x7f0000000100), &(0x7f0000000200), 0x8) 04:42:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) exit(0x0) 04:42:56 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) socket$packet(0x11, 0x0, 0x300) accept$inet(0xffffffffffffff9c, &(0x7f0000000100)={0x0, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) 04:42:56 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) pipe(&(0x7f0000000000)) rt_sigtimedwait(&(0x7f0000000080), &(0x7f0000000100), &(0x7f0000000200), 0x8) 04:42:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) pipe(&(0x7f0000000000)) rt_sigtimedwait(&(0x7f0000000080), &(0x7f0000000100), &(0x7f0000000200), 0x8) 04:42:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000100)={0x2}) 04:42:57 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) socket$inet6(0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000080)=""/10) 04:42:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) socket$packet(0x11, 0x0, 0x300) accept$inet(0xffffffffffffff9c, &(0x7f0000000100)={0x0, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) 04:42:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) getpgrp(0x0) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 04:42:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) socket$packet(0x11, 0x0, 0x300) accept$inet(0xffffffffffffff9c, &(0x7f0000000100)={0x0, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) 04:42:57 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) 04:42:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) pipe(&(0x7f0000000000)) rt_sigtimedwait(&(0x7f0000000080), &(0x7f0000000100), &(0x7f0000000200), 0x8) 04:42:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000100)={0x2}) 04:42:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) socket$packet(0x11, 0x0, 0x300) accept$inet(0xffffffffffffff9c, &(0x7f0000000100)={0x0, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) 04:42:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) exit(0x0) 04:42:57 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000080)=""/10) 04:42:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) getpgrp(0x0) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 04:42:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 04:42:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ad}]}) pipe(&(0x7f0000000000)) rt_sigtimedwait(&(0x7f0000000080), &(0x7f0000000100), &(0x7f0000000200), 0x8) 04:42:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) socket$packet(0x11, 0x0, 0x300) accept$inet(0xffffffffffffff9c, &(0x7f0000000100)={0x0, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) 04:42:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000100)={0x2}) 04:42:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501eb}]}) socket$packet(0x11, 0x0, 0x300) accept$inet(0xffffffffffffff9c, &(0x7f0000000100)={0x0, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) 04:42:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ad}]}) pipe(&(0x7f0000000000)) rt_sigtimedwait(&(0x7f0000000080), &(0x7f0000000100), &(0x7f0000000200), 0x8) 04:42:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) getpgrp(0x0) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 04:42:57 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000080)=""/10) 04:42:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$packet(0x11, 0x0, 0x300) accept$inet(0xffffffffffffff9c, &(0x7f0000000100)={0x0, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) 04:42:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 04:42:58 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000080)=""/10) 04:42:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) 04:42:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000100)={0x2}) 04:42:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) exit(0x0) 04:42:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ad}]}) pipe(&(0x7f0000000000)) rt_sigtimedwait(&(0x7f0000000080), &(0x7f0000000100), &(0x7f0000000200), 0x8) 04:42:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) getpgrp(0x0) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 04:42:58 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000080)=""/10) 04:42:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000100)={0x2}) 04:42:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 04:42:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) pipe(&(0x7f0000000000)) rt_sigtimedwait(&(0x7f0000000080), &(0x7f0000000100), &(0x7f0000000200), 0x8) 04:42:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000100)={0x2}) 04:42:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) [ 726.768826] kauditd_printk_skb: 6 callbacks suppressed [ 726.768849] audit: type=1326 audit(1529728978.767:1285): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13803 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 04:42:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$packet(0x11, 0x0, 0x300) accept$inet(0xffffffffffffff9c, &(0x7f0000000100)={0x0, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) 04:42:58 executing program 3: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000100)={0x2}) 04:42:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) fcntl$getown(0xffffffffffffffff, 0x9) [ 727.014305] audit: type=1326 audit(1529728979.013:1286): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13820 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) fcntl$getown(0xffffffffffffffff, 0x9) 04:42:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 04:42:59 executing program 3: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000100)={0x2}) 04:42:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) exit(0x0) 04:42:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) 04:42:59 executing program 3: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000100)={0x2}) 04:42:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) fcntl$getown(0xffffffffffffffff, 0x9) 04:42:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 04:42:59 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000080)=""/10) 04:42:59 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) pipe(&(0x7f0000000000)) rt_sigtimedwait(&(0x7f0000000080), &(0x7f0000000100), &(0x7f0000000200), 0x8) [ 727.670869] audit: type=1326 audit(1529728979.669:1287): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13848 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:59 executing program 2: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) [ 727.743697] audit: type=1326 audit(1529728979.699:1288): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13846 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:59 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000100)={0x2}) 04:42:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) [ 727.821379] audit: type=1326 audit(1529728979.766:1289): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13857 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:42:59 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$packet(0x11, 0x0, 0x300) accept$inet(0xffffffffffffff9c, &(0x7f0000000100)={0x0, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) 04:42:59 executing program 0: getpgrp(0x0) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 04:42:59 executing program 2: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 04:42:59 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000100)={0x2}) 04:43:00 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) 04:43:00 executing program 0: getpgrp(0x0) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) [ 728.032284] audit: type=1326 audit(1529728980.030:1290): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13877 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:00 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000080)=""/10) 04:43:00 executing program 2: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 04:43:00 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000100)={0x2}) 04:43:00 executing program 0: getpgrp(0x0) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 04:43:00 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) 04:43:00 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50192}]}) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000300)={{{@in6, @in=@multicast2=0xe0000002}}, {{@in=@rand_addr}, 0x0, @in=@rand_addr}}, 0xe8) [ 728.639451] audit: type=1326 audit(1529728980.638:1291): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13897 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:00 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) pipe(&(0x7f0000000000)) rt_sigtimedwait(&(0x7f0000000080), &(0x7f0000000100), &(0x7f0000000200), 0x8) 04:43:00 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) getpgrp(0x0) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 04:43:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000100)={0x2}) 04:43:00 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) [ 728.834666] audit: type=1326 audit(1529728980.833:1292): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13912 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:00 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 04:43:00 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) socket$packet(0x11, 0x0, 0x300) 04:43:00 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) close(0xffffffffffffffff) 04:43:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000100)={0x2}) 04:43:00 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) getpgrp(0x0) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 04:43:00 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000140)}) keyctl$negate(0xd, 0x0, 0x0, 0x0) 04:43:01 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) getpgrp(0x0) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 04:43:01 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) socket$packet(0x11, 0x0, 0x300) 04:43:01 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 04:43:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000100)={0x2}) 04:43:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000140)}) keyctl$negate(0xd, 0x0, 0x0, 0x0) 04:43:01 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}, 0x10) 04:43:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000140)}) keyctl$negate(0xd, 0x0, 0x0, 0x0) 04:43:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 04:43:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000100)={0x2}) 04:43:01 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) getpgrp(0x0) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 04:43:01 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) socket$packet(0x11, 0x0, 0x300) 04:43:01 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000380), 0x8) 04:43:01 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) 04:43:01 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}, 0x10) 04:43:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000100)={0x2}) 04:43:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 04:43:01 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) getpgrp(0x0) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 04:43:01 executing program 7: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) 04:43:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) 04:43:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000140)}) keyctl$negate(0xd, 0x0, 0x0, 0x0) 04:43:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000380), 0x8) 04:43:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000100)={0x2}) 04:43:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}, 0x10) 04:43:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 04:43:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) getpgrp(0x0) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 04:43:02 executing program 7: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) 04:43:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) 04:43:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) keyctl$negate(0xd, 0x0, 0x0, 0x0) 04:43:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000380), 0x8) 04:43:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) getpgrp(0x0) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 04:43:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000100)={0x2}) 04:43:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 04:43:02 executing program 7: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) 04:43:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}, 0x10) 04:43:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) getpgrp(0x0) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) [ 730.519411] audit: type=1326 audit(1529728982.518:1293): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14039 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) 04:43:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) keyctl$negate(0xd, 0x0, 0x0, 0x0) 04:43:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000380), 0x8) 04:43:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 04:43:02 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) 04:43:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) getpgrp(0x0) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 04:43:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}, 0x10) 04:43:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) 04:43:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) keyctl$negate(0xd, 0x0, 0x0, 0x0) 04:43:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 04:43:02 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) 04:43:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}, 0x10) 04:43:03 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000100)={0x2}) 04:43:03 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) 04:43:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) getpgrp(0x0) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 04:43:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 04:43:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) rt_sigpending(&(0x7f0000000380), 0x8) 04:43:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) 04:43:03 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000140)}) keyctl$negate(0xd, 0x0, 0x0, 0x0) [ 731.444992] audit: type=1326 audit(1529728983.443:1294): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14099 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:03 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000140)}) keyctl$negate(0xd, 0x0, 0x0, 0x0) 04:43:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) rt_sigpending(&(0x7f0000000380), 0x8) 04:43:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) 04:43:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}, 0x10) 04:43:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) 04:43:03 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000140)}) keyctl$negate(0xd, 0x0, 0x0, 0x0) 04:43:03 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000140)}) keyctl$negate(0xd, 0x0, 0x0, 0x0) 04:43:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) 04:43:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) rt_sigpending(&(0x7f0000000380), 0x8) 04:43:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000100)={0x2}) 04:43:04 executing program 1: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}, 0x10) 04:43:04 executing program 6: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) 04:43:04 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000140)}) keyctl$negate(0xd, 0x0, 0x0, 0x0) 04:43:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) 04:43:04 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000380), 0x8) 04:43:04 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 04:43:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) getpgrp(0x0) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) [ 732.446405] kauditd_printk_skb: 2 callbacks suppressed [ 732.446427] audit: type=1326 audit(1529728984.445:1297): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14156 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 732.471687] audit: type=1326 audit(1529728984.450:1298): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14152 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:04 executing program 1: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}, 0x10) 04:43:04 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000380), 0x8) 04:43:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) [ 732.502215] audit: type=1326 audit(1529728984.500:1299): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14158 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:04 executing program 6: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) 04:43:04 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000140)}) keyctl$negate(0xd, 0x0, 0x0, 0x0) 04:43:04 executing program 6: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) 04:43:04 executing program 1: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}, 0x10) 04:43:04 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000380), 0x8) 04:43:05 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) 04:43:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000140)}) keyctl$negate(0xd, 0x0, 0x0, 0x0) 04:43:05 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) 04:43:05 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000380), 0x8) 04:43:05 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}, 0x10) 04:43:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 04:43:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) memfd_create(&(0x7f00000003c0)='@wlan0trustedposix_acl_access]$vboxnet1\x00', 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000300)) 04:43:05 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) getpgrp(0x0) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) [ 733.458449] audit: type=1326 audit(1529728985.457:1300): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14201 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:05 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) 04:43:05 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000380), 0x8) 04:43:05 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) 04:43:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000140)}) keyctl$negate(0xd, 0x0, 0x0, 0x0) [ 733.519492] audit: type=1326 audit(1529728985.478:1301): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14200 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:05 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}, 0x10) 04:43:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) memfd_create(&(0x7f00000003c0)='@wlan0trustedposix_acl_access]$vboxnet1\x00', 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000300)) 04:43:05 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) 04:43:05 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000380), 0x8) 04:43:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000140)}) keyctl$negate(0xd, 0x0, 0x0, 0x0) 04:43:05 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) 04:43:05 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}, 0x10) [ 733.861588] audit: type=1326 audit(1529728985.859:1302): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14238 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50211}]}) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000140)}) keyctl$negate(0xd, 0x0, 0x0, 0x0) 04:43:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000380), 0x8) 04:43:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000300)}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}, 0x10) 04:43:06 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) memfd_create(&(0x7f00000003c0)='@wlan0trustedposix_acl_access]$vboxnet1\x00', 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000300)) 04:43:06 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) 04:43:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50211}]}) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000140)}) keyctl$negate(0xd, 0x0, 0x0, 0x0) 04:43:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000380), 0x8) 04:43:06 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000280)) 04:43:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f00000001c0)) 04:43:06 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) memfd_create(&(0x7f00000003c0)='@wlan0trustedposix_acl_access]$vboxnet1\x00', 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000300)) 04:43:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000380), 0x8) 04:43:06 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) 04:43:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50211}]}) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000140)}) keyctl$negate(0xd, 0x0, 0x0, 0x0) 04:43:06 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) 04:43:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000300)}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}, 0x10) 04:43:06 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f0000000180)={0x5}) 04:43:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f00000001c0)) 04:43:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ad}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000380), 0x8) 04:43:06 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000300)) [ 734.812772] audit: type=1326 audit(1529728986.811:1303): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14297 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000140)}) keyctl$negate(0xd, 0x0, 0x0, 0x0) 04:43:06 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) 04:43:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000300)}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}, 0x10) 04:43:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ad}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000380), 0x8) 04:43:06 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000300)) 04:43:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f00000001c0)) [ 734.961959] audit: type=1326 audit(1529728986.960:1304): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14315 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f0000000180)={0x5}) 04:43:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ad}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000380), 0x8) 04:43:07 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000300)) 04:43:07 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) 04:43:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) 04:43:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f00000001c0)) 04:43:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x50355}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}, 0x10) 04:43:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f0000000180)={0x5}) 04:43:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000380), 0x8) 04:43:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x50355}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}, 0x10) [ 735.748298] audit: type=1326 audit(1529728987.746:1305): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14343 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 735.834632] audit: type=1326 audit(1529728987.784:1306): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14357 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) 04:43:07 executing program 3: memfd_create(&(0x7f00000003c0)='@wlan0trustedposix_acl_access]$vboxnet1\x00', 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000300)) 04:43:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000140)}) keyctl$negate(0xd, 0x0, 0x0, 0x0) 04:43:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f0000000180)={0x5}) 04:43:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x50355}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}, 0x10) 04:43:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501e4}]}) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f00000001c0)) 04:43:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) 04:43:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}, 0x10) 04:43:08 executing program 3: memfd_create(&(0x7f00000003c0)='@wlan0trustedposix_acl_access]$vboxnet1\x00', 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000300)) 04:43:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000380), 0x8) 04:43:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501e4}]}) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f00000001c0)) 04:43:08 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f0000000180)={0x5}) 04:43:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) 04:43:08 executing program 3: memfd_create(&(0x7f00000003c0)='@wlan0trustedposix_acl_access]$vboxnet1\x00', 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000300)) 04:43:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) 04:43:08 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) memfd_create(&(0x7f00000003c0)='@wlan0trustedposix_acl_access]$vboxnet1\x00', 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000300)) 04:43:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501e4}]}) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f00000001c0)) 04:43:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000140)}) keyctl$negate(0xd, 0x0, 0x0, 0x0) 04:43:08 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f0000000180)={0x5}) 04:43:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) 04:43:08 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) memfd_create(&(0x7f00000003c0)='@wlan0trustedposix_acl_access]$vboxnet1\x00', 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000300)) 04:43:09 executing program 2: syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f00000001c0)) 04:43:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f0000000180)={0x5}) 04:43:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}, 0x10) 04:43:09 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) memfd_create(&(0x7f00000003c0)='@wlan0trustedposix_acl_access]$vboxnet1\x00', 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000300)) 04:43:09 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000380), 0x8) 04:43:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) 04:43:09 executing program 2: syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f00000001c0)) 04:43:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) 04:43:09 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) memfd_create(&(0x7f00000003c0)='@wlan0trustedposix_acl_access]$vboxnet1\x00', 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000300)) 04:43:09 executing program 0: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f0000000180)={0x5}) [ 737.706896] kauditd_printk_skb: 6 callbacks suppressed [ 737.706967] audit: type=1326 audit(1529728989.705:1313): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14458 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:09 executing program 0: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f0000000180)={0x5}) 04:43:09 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) memfd_create(&(0x7f00000003c0)='@wlan0trustedposix_acl_access]$vboxnet1\x00', 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000300)) [ 737.766225] audit: type=1326 audit(1529728989.743:1314): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14460 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:09 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) memfd_create(&(0x7f00000003c0)='@wlan0trustedposix_acl_access]$vboxnet1\x00', 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000300)) 04:43:09 executing program 2: syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f00000001c0)) 04:43:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) 04:43:09 executing program 0: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f0000000180)={0x5}) 04:43:09 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050206}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000140)={0x0, 0x0, 'client0\x00', 0x0, "75ae4939ecfc1dc8", "27ad424e51db504f3bf98828ec77c9627e2a3fa9146d44226e6ab11ce262979d"}) 04:43:10 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f0000000180)={0x5}) 04:43:10 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}, 0x10) 04:43:10 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50211}]}) memfd_create(&(0x7f00000003c0)='@wlan0trustedposix_acl_access]$vboxnet1\x00', 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000300)) [ 738.208654] audit: type=1326 audit(1529728990.207:1315): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14495 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:10 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50211}]}) memfd_create(&(0x7f00000003c0)='@wlan0trustedposix_acl_access]$vboxnet1\x00', 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000300)) 04:43:10 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f00000001c0)) 04:43:10 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) getpgid(0xffffffffffffffff) 04:43:10 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) 04:43:10 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050206}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000140)={0x0, 0x0, 'client0\x00', 0x0, "75ae4939ecfc1dc8", "27ad424e51db504f3bf98828ec77c9627e2a3fa9146d44226e6ab11ce262979d"}) 04:43:10 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000003c0)={0x10}, 0xc, &(0x7f0000000400)={&(0x7f0000000580)={0x14}, 0x14}, 0x1}, 0x0) 04:43:10 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f0000000180)={0x5}) 04:43:10 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50211}]}) memfd_create(&(0x7f00000003c0)='@wlan0trustedposix_acl_access]$vboxnet1\x00', 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000300)) 04:43:10 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f00000001c0)) 04:43:10 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) getpgid(0xffffffffffffffff) [ 738.774062] audit: type=1326 audit(1529728990.772:1316): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14520 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:10 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) memfd_create(&(0x7f00000003c0)='@wlan0trustedposix_acl_access]$vboxnet1\x00', 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000300)) 04:43:10 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f0000000180)={0x5}) 04:43:10 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050206}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000140)={0x0, 0x0, 'client0\x00', 0x0, "75ae4939ecfc1dc8", "27ad424e51db504f3bf98828ec77c9627e2a3fa9146d44226e6ab11ce262979d"}) 04:43:10 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f00000001c0)) [ 738.918094] audit: type=1326 audit(1529728990.916:1317): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14529 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:11 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050206}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000140)={0x0, 0x0, 'client0\x00', 0x0, "75ae4939ecfc1dc8", "27ad424e51db504f3bf98828ec77c9627e2a3fa9146d44226e6ab11ce262979d"}) 04:43:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) rmdir(&(0x7f0000000140)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) 04:43:11 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) getpgid(0xffffffffffffffff) 04:43:11 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f0000000180)={0x5}) 04:43:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000300), 0x4) 04:43:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000300), 0x4) 04:43:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f00000001c0)) 04:43:11 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f0000000180)={0x5}) 04:43:11 executing program 7: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) 04:43:11 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050206}]}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000140)={0x0, 0x0, 'client0\x00', 0x0, "75ae4939ecfc1dc8", "27ad424e51db504f3bf98828ec77c9627e2a3fa9146d44226e6ab11ce262979d"}) 04:43:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) msgget$private(0x0, 0x0) msgctl$IPC_RMID(0x0, 0x0) 04:43:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000001100)={0x0, 0x0, 0x0, &(0x7f0000000100)}) 04:43:11 executing program 7: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) 04:43:11 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050206}]}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000140)={0x0, 0x0, 'client0\x00', 0x0, "75ae4939ecfc1dc8", "27ad424e51db504f3bf98828ec77c9627e2a3fa9146d44226e6ab11ce262979d"}) 04:43:11 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f0000000180)={0x5}) 04:43:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f00000001c0)) 04:43:11 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) memfd_create(&(0x7f00000003c0)='@wlan0trustedposix_acl_access]$vboxnet1\x00', 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000300)) 04:43:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000300), 0x4) 04:43:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000040)) [ 739.966216] audit: type=1326 audit(1529728991.964:1318): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14596 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000001100)={0x0, 0x0, 0x0, &(0x7f0000000100)}) 04:43:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f00000001c0)) 04:43:12 executing program 7: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) 04:43:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f0000000180)={0x5}) 04:43:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050206}]}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000140)={0x0, 0x0, 'client0\x00', 0x0, "75ae4939ecfc1dc8", "27ad424e51db504f3bf98828ec77c9627e2a3fa9146d44226e6ab11ce262979d"}) 04:43:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000300), 0x4) 04:43:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000040)) 04:43:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f00000001c0)) 04:43:12 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) 04:43:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f0000000180)={0x5}) 04:43:12 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) memfd_create(&(0x7f00000003c0)='@wlan0trustedposix_acl_access]$vboxnet1\x00', 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000300)) 04:43:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000001100)={0x0, 0x0, 0x0, &(0x7f0000000100)}) 04:43:12 executing program 5: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000140)={0x0, 0x0, 'client0\x00', 0x0, "75ae4939ecfc1dc8", "27ad424e51db504f3bf98828ec77c9627e2a3fa9146d44226e6ab11ce262979d"}) 04:43:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f00000001c0)) 04:43:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000300), 0x4) 04:43:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000040)) 04:43:12 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) 04:43:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f0000000180)={0x5}) [ 740.899670] audit: type=1326 audit(1529728992.898:1319): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14643 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f00000001c0)) 04:43:13 executing program 5: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000140)={0x0, 0x0, 'client0\x00', 0x0, "75ae4939ecfc1dc8", "27ad424e51db504f3bf98828ec77c9627e2a3fa9146d44226e6ab11ce262979d"}) 04:43:13 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) 04:43:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000300), 0x4) 04:43:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f0000000180)={0x5}) 04:43:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f00000001c0)) 04:43:13 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000040)) 04:43:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000001100)={0x0, 0x0, 0x0, &(0x7f0000000100)}) [ 741.159585] audit: type=1326 audit(1529728993.158:1320): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14670 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 741.273819] audit: type=1326 audit(1529728993.210:1321): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14675 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:13 executing program 5: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000140)={0x0, 0x0, 'client0\x00', 0x0, "75ae4939ecfc1dc8", "27ad424e51db504f3bf98828ec77c9627e2a3fa9146d44226e6ab11ce262979d"}) 04:43:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000300), 0x4) 04:43:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) 04:43:13 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000040)) 04:43:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000001100)={0x0, 0x0, 0x0, &(0x7f0000000100)}) 04:43:13 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050206}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000140)={0x0, 0x0, 'client0\x00', 0x0, "75ae4939ecfc1dc8", "27ad424e51db504f3bf98828ec77c9627e2a3fa9146d44226e6ab11ce262979d"}) 04:43:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000001100)={0x0, 0x0, 0x0, &(0x7f0000000100)}) 04:43:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) 04:43:13 executing program 1: syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000300), 0x4) 04:43:13 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000040)) 04:43:14 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050206}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000140)={0x0, 0x0, 'client0\x00', 0x0, "75ae4939ecfc1dc8", "27ad424e51db504f3bf98828ec77c9627e2a3fa9146d44226e6ab11ce262979d"}) 04:43:14 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000001100)={0x0, 0x0, 0x0, &(0x7f0000000100)}) 04:43:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f0000000180)={0x5}) 04:43:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f00000001c0)) 04:43:14 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) 04:43:14 executing program 1: syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000300), 0x4) 04:43:14 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050206}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000140)={0x0, 0x0, 'client0\x00', 0x0, "75ae4939ecfc1dc8", "27ad424e51db504f3bf98828ec77c9627e2a3fa9146d44226e6ab11ce262979d"}) 04:43:14 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000040)) [ 742.223799] audit: type=1326 audit(1529728994.222:1322): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14725 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:14 executing program 6: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000001100)={0x0, 0x0, 0x0, &(0x7f0000000100)}) 04:43:14 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) 04:43:14 executing program 1: syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000300), 0x4) 04:43:14 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000140)={0x0, 0x0, 'client0\x00', 0x0, "75ae4939ecfc1dc8", "27ad424e51db504f3bf98828ec77c9627e2a3fa9146d44226e6ab11ce262979d"}) 04:43:14 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) 04:43:14 executing program 6: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000001100)={0x0, 0x0, 0x0, &(0x7f0000000100)}) 04:43:14 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000040)) 04:43:14 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000300), 0x4) 04:43:14 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) 04:43:14 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) 04:43:15 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000040)) 04:43:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f00000001c0)) 04:43:15 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f0000000180)={0x5}) 04:43:15 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) 04:43:15 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000300), 0x4) 04:43:15 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) 04:43:15 executing program 6: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000001100)={0x0, 0x0, 0x0, &(0x7f0000000100)}) 04:43:15 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000140)={0x0, 0x0, 'client0\x00', 0x0, "75ae4939ecfc1dc8", "27ad424e51db504f3bf98828ec77c9627e2a3fa9146d44226e6ab11ce262979d"}) 04:43:15 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000040)) [ 743.220539] kauditd_printk_skb: 1 callbacks suppressed [ 743.220562] audit: type=1326 audit(1529728995.219:1324): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14786 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:15 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000040)) 04:43:15 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000300), 0x4) 04:43:15 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000140)={0x0, 0x0, 'client0\x00', 0x0, "75ae4939ecfc1dc8", "27ad424e51db504f3bf98828ec77c9627e2a3fa9146d44226e6ab11ce262979d"}) 04:43:15 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000001100)={0x0, 0x0, 0x0, &(0x7f0000000100)}) 04:43:15 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) 04:43:15 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) [ 743.337546] audit: type=1326 audit(1529728995.249:1325): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14802 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:15 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050206}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000140)={0x0, 0x0, 'client0\x00', 0x0, "75ae4939ecfc1dc8", "27ad424e51db504f3bf98828ec77c9627e2a3fa9146d44226e6ab11ce262979d"}) 04:43:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000300), 0x4) [ 743.499915] audit: type=1326 audit(1529728995.455:1326): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14813 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:16 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050206}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000140)={0x0, 0x0, 'client0\x00', 0x0, "75ae4939ecfc1dc8", "27ad424e51db504f3bf98828ec77c9627e2a3fa9146d44226e6ab11ce262979d"}) 04:43:16 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000001100)={0x0, 0x0, 0x0, &(0x7f0000000100)}) 04:43:16 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000040)) 04:43:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) 04:43:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000300), 0x4) 04:43:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000300), 0x4) 04:43:16 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000001100)={0x0, 0x0, 0x0, &(0x7f0000000100)}) 04:43:16 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050206}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000140)={0x0, 0x0, 'client0\x00', 0x0, "75ae4939ecfc1dc8", "27ad424e51db504f3bf98828ec77c9627e2a3fa9146d44226e6ab11ce262979d"}) 04:43:16 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000040)) 04:43:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) 04:43:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000300), 0x4) 04:43:16 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) 04:43:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000001100)={0x0, 0x0, 0x0, &(0x7f0000000100)}) 04:43:16 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000140)={0x0, 0x0, 'client0\x00', 0x0, "75ae4939ecfc1dc8", "27ad424e51db504f3bf98828ec77c9627e2a3fa9146d44226e6ab11ce262979d"}) [ 744.487784] audit: type=1326 audit(1529728996.486:1327): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14872 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000040)) 04:43:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) 04:43:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000300), 0x4) [ 744.571480] audit: type=1326 audit(1529728996.568:1328): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14880 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000001100)={0x0, 0x0, 0x0, &(0x7f0000000100)}) 04:43:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000300), 0x4) 04:43:16 executing program 3: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) 04:43:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000040)) 04:43:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000001100)={0x0, 0x0, 0x0, &(0x7f0000000100)}) 04:43:16 executing program 3: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) 04:43:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000300), 0x4) 04:43:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000001100)={0x0, 0x0, 0x0, &(0x7f0000000100)}) 04:43:16 executing program 3: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) 04:43:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000040)) [ 744.940298] audit: type=1326 audit(1529728996.939:1329): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14914 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:17 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) 04:43:17 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) [ 745.415205] audit: type=1326 audit(1529728997.413:1330): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14934 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:17 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000140)={0x0, 0x0, 'client0\x00', 0x0, "75ae4939ecfc1dc8", "27ad424e51db504f3bf98828ec77c9627e2a3fa9146d44226e6ab11ce262979d"}) 04:43:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000001100)={0x0, 0x0, 0x0, &(0x7f0000000100)}) 04:43:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000040)) 04:43:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) inotify_init1(0x0) 04:43:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) pkey_alloc(0x0, 0x0) pkey_alloc(0x0, 0x0) 04:43:17 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) [ 745.518662] audit: type=1326 audit(1529728997.517:1331): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14939 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:17 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) 04:43:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000001100)={0x0, 0x0, 0x0, &(0x7f0000000100)}) 04:43:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000040)) 04:43:17 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) 04:43:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000300), 0x4) 04:43:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) inotify_init1(0x0) 04:43:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) pkey_alloc(0x0, 0x0) pkey_alloc(0x0, 0x0) 04:43:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000001100)={0x0, 0x0, 0x0, &(0x7f0000000100)}) [ 745.924857] audit: type=1326 audit(1529728997.922:1332): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14975 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 745.950139] audit: type=1326 audit(1529728997.947:1333): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14980 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:18 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000040)) 04:43:18 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) 04:43:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000140)={0x0, 0x0, 'client0\x00', 0x0, "75ae4939ecfc1dc8", "27ad424e51db504f3bf98828ec77c9627e2a3fa9146d44226e6ab11ce262979d"}) 04:43:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) pkey_alloc(0x0, 0x0) pkey_alloc(0x0, 0x0) 04:43:18 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) inotify_init1(0x0) 04:43:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 04:43:18 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) 04:43:18 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000040)) 04:43:18 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) 04:43:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) pkey_alloc(0x0, 0x0) pkey_alloc(0x0, 0x0) 04:43:18 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) inotify_init1(0x0) 04:43:18 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) 04:43:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000300), 0x4) 04:43:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 04:43:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) pkey_alloc(0x0, 0x0) 04:43:18 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) inotify_init1(0x0) 04:43:18 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) 04:43:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000001100)={0x0, 0x0, 0x0, &(0x7f0000000100)}) 04:43:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) pkey_alloc(0x0, 0x0) 04:43:19 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) 04:43:19 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) inotify_init1(0x0) 04:43:19 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 04:43:19 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000040)) 04:43:19 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50235}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) 04:43:19 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) inotify_init1(0x0) 04:43:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) pkey_alloc(0x0, 0x0) 04:43:19 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 04:43:19 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50235}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) 04:43:19 executing program 2: pkey_alloc(0x0, 0x0) pkey_alloc(0x0, 0x0) 04:43:19 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) inotify_init1(0x0) 04:43:19 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 04:43:19 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50235}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) 04:43:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000001c0), 0x0) mq_unlink(&(0x7f0000000240)='md5sum.\x00') 04:43:19 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000001100)={0x0, 0x0, 0x0, &(0x7f0000000100)}) 04:43:19 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) inotify_init1(0x0) 04:43:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) 04:43:20 executing program 2: pkey_alloc(0x0, 0x0) pkey_alloc(0x0, 0x0) 04:43:20 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 04:43:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000040)) 04:43:20 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50235}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) 04:43:20 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) inotify_init1(0x0) 04:43:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000001c0), 0x0) mq_unlink(&(0x7f0000000240)='md5sum.\x00') 04:43:20 executing program 2: pkey_alloc(0x0, 0x0) pkey_alloc(0x0, 0x0) [ 748.397414] kauditd_printk_skb: 7 callbacks suppressed [ 748.397436] audit: type=1326 audit(1529729000.396:1341): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15116 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:20 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 04:43:20 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) inotify_init1(0x0) [ 748.487007] audit: type=1326 audit(1529729000.485:1342): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15127 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:20 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) pkey_alloc(0x0, 0x0) pkey_alloc(0x0, 0x0) 04:43:20 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50235}]}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) 04:43:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000001c0), 0x0) mq_unlink(&(0x7f0000000240)='md5sum.\x00') 04:43:20 executing program 7: dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 04:43:20 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) inotify_init1(0x0) 04:43:20 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) pkey_alloc(0x0, 0x0) pkey_alloc(0x0, 0x0) 04:43:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) 04:43:21 executing program 7: dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 04:43:21 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50235}]}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) [ 749.333852] audit: type=1326 audit(1529729001.332:1343): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15170 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:21 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50235}]}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) 04:43:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000001c0), 0x0) mq_unlink(&(0x7f0000000240)='md5sum.\x00') 04:43:21 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) inotify_init1(0x0) 04:43:21 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) pkey_alloc(0x0, 0x0) pkey_alloc(0x0, 0x0) 04:43:21 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f00000001c0), 0x4) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000300)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)}) 04:43:21 executing program 7: dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 04:43:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000003340)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000003300)={&(0x7f0000002b00)=ANY=[]}, 0x1}, 0x0) 04:43:21 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) inotify_init1(0x0) 04:43:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) pkey_alloc(0x0, 0x0) pkey_alloc(0x0, 0x0) 04:43:21 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 04:43:21 executing program 5: openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) 04:43:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) mq_unlink(&(0x7f0000000240)='md5sum.\x00') 04:43:21 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f00000001c0), 0x4) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000300)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)}) 04:43:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) mq_unlink(&(0x7f0000000240)='md5sum.\x00') 04:43:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) pkey_alloc(0x0, 0x0) pkey_alloc(0x0, 0x0) 04:43:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000080)={{0x0, @remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 'fo\x00'}, {@dev={0xac, 0x14, 0x14}}}, 0x44) 04:43:22 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) inotify_init1(0x0) 04:43:22 executing program 5: openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) 04:43:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0) 04:43:22 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 04:43:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f00000001c0), 0x4) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000300)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)}) 04:43:22 executing program 5: openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) 04:43:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) pkey_alloc(0x0, 0x0) pkey_alloc(0x0, 0x0) 04:43:22 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 04:43:22 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) inotify_init1(0x0) 04:43:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000080)={{0x0, @remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 'fo\x00'}, {@dev={0xac, 0x14, 0x14}}}, 0x44) 04:43:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) mq_unlink(&(0x7f0000000240)='md5sum.\x00') 04:43:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f00000001c0), 0x4) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000300)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)}) 04:43:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0) 04:43:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) pkey_alloc(0x0, 0x0) pkey_alloc(0x0, 0x0) 04:43:22 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 04:43:22 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) inotify_init1(0x0) 04:43:22 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50235}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) 04:43:22 executing program 1: write$cgroup_pid(0xffffffffffffffff, &(0x7f00000001c0), 0x0) mq_unlink(&(0x7f0000000240)='md5sum.\x00') 04:43:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) pkey_alloc(0x0, 0x0) pkey_alloc(0x0, 0x0) 04:43:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000080)={{0x0, @remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 'fo\x00'}, {@dev={0xac, 0x14, 0x14}}}, 0x44) 04:43:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0) 04:43:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000300)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)}) 04:43:22 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50235}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) 04:43:22 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 04:43:22 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) inotify_init1(0x0) 04:43:22 executing program 1: write$cgroup_pid(0xffffffffffffffff, &(0x7f00000001c0), 0x0) mq_unlink(&(0x7f0000000240)='md5sum.\x00') 04:43:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) pkey_alloc(0x0, 0x0) pkey_alloc(0x0, 0x0) 04:43:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0) 04:43:23 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000080)={{0x0, @remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 'fo\x00'}, {@dev={0xac, 0x14, 0x14}}}, 0x44) 04:43:23 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50235}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) 04:43:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 04:43:23 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) inotify_init1(0x0) 04:43:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000300)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)}) 04:43:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) pkey_alloc(0x0, 0x0) pkey_alloc(0x0, 0x0) 04:43:23 executing program 1: write$cgroup_pid(0xffffffffffffffff, &(0x7f00000001c0), 0x0) mq_unlink(&(0x7f0000000240)='md5sum.\x00') 04:43:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 04:43:23 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) 04:43:23 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) inotify_init1(0x0) 04:43:23 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {}, {}, @ramp}) [ 751.346093] audit: type=1326 audit(1529729003.344:1344): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15321 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) pwritev(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0) 04:43:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000300)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)}) 04:43:23 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000001c0), 0x0) mq_unlink(&(0x7f0000000240)='md5sum.\x00') [ 751.504086] audit: type=1326 audit(1529729003.502:1345): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15331 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:23 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) 04:43:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 04:43:23 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {}, {}, @ramp}) 04:43:23 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000001c0), 0x0) mq_unlink(&(0x7f0000000240)='md5sum.\x00') 04:43:23 executing program 6: setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f00000001c0), 0x4) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000300)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)}) 04:43:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) pwritev(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0) 04:43:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 04:43:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) pkey_alloc(0x0, 0x0) pkey_alloc(0x0, 0x0) 04:43:24 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) 04:43:24 executing program 6: setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f00000001c0), 0x4) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000300)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)}) 04:43:24 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000001c0), 0x0) mq_unlink(&(0x7f0000000240)='md5sum.\x00') [ 752.283828] audit: type=1326 audit(1529729004.282:1346): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15382 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) inotify_init1(0x0) 04:43:24 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {}, {}, @ramp}) 04:43:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) pwritev(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0) 04:43:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 04:43:24 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50235}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) 04:43:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000001c0), 0x0) mq_unlink(&(0x7f0000000240)='md5sum.\x00') 04:43:24 executing program 6: setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f00000001c0), 0x4) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000300)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)}) [ 752.425579] audit: type=1326 audit(1529729004.424:1347): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15393 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:24 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50235}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) [ 752.491680] audit: type=1326 audit(1529729004.448:1348): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15389 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:24 executing program 3: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0) 04:43:24 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f00000001c0), 0x4) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000300)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)}) 04:43:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000001c0), 0x0) mq_unlink(&(0x7f0000000240)='md5sum.\x00') 04:43:24 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {}, {}, @ramp}) 04:43:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) pkey_alloc(0x0, 0x0) pkey_alloc(0x0, 0x0) 04:43:25 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50235}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) 04:43:25 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f00000001c0), 0x4) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000300)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)}) 04:43:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000001c0), 0x0) mq_unlink(&(0x7f0000000240)='md5sum.\x00') [ 753.255010] audit: type=1326 audit(1529729005.253:1349): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15432 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) inotify_init1(0x0) 04:43:25 executing program 3: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0) 04:43:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {}, {}, @ramp}) 04:43:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 04:43:25 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f00000001c0), 0x4) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000300)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)}) 04:43:25 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) 04:43:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]}) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000001c0), 0x0) mq_unlink(&(0x7f0000000240)='md5sum.\x00') [ 753.404154] audit: type=1326 audit(1529729005.402:1350): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15443 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {}, {}, @ramp}) 04:43:25 executing program 3: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0) 04:43:25 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f00000001c0), 0x4) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000300)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)}) [ 753.474639] audit: type=1326 audit(1529729005.429:1351): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15442 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 753.494605] audit: type=1326 audit(1529729005.465:1352): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15449 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]}) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000001c0), 0x0) mq_unlink(&(0x7f0000000240)='md5sum.\x00') 04:43:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]}) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000001c0), 0x0) mq_unlink(&(0x7f0000000240)='md5sum.\x00') 04:43:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {}, {}, @ramp}) 04:43:26 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0) 04:43:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f00000001c0), 0x4) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000300)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)}) 04:43:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000001c0), 0x0) mq_unlink(&(0x7f0000000240)='md5sum.\x00') [ 754.186762] audit: type=1326 audit(1529729006.185:1353): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15475 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:26 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) 04:43:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) memfd_create(&(0x7f0000000100)='-{\x00', 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={'team0\x00', {0x2, 0x0, @rand_addr}}) 04:43:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f00000001c0), 0x4) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000300)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)}) 04:43:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 04:43:26 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0) 04:43:26 executing program 4: openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {}, {}, @ramp}) 04:43:26 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000000c0)) prctl$setendian(0x14, 0x0) 04:43:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f00000001c0), 0x4) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000300)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)}) [ 754.393587] audit: type=1326 audit(1529729006.392:1354): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15494 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) memfd_create(&(0x7f0000000100)='-{\x00', 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={'team0\x00', {0x2, 0x0, @rand_addr}}) [ 754.504169] audit: type=1326 audit(1529729006.502:1355): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15506 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f00000001c0), 0x4) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000300)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)}) 04:43:26 executing program 4: openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {}, {}, @ramp}) 04:43:26 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0) 04:43:26 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000000c0)) prctl$setendian(0x14, 0x0) 04:43:26 executing program 4: openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {}, {}, @ramp}) 04:43:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0) 04:43:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000001c0), 0x0) mq_unlink(&(0x7f0000000240)='md5sum.\x00') [ 755.110574] audit: type=1326 audit(1529729007.109:1356): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15537 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:27 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) 04:43:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f00000001c0), 0x4) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000300)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)}) 04:43:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) memfd_create(&(0x7f0000000100)='-{\x00', 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={'team0\x00', {0x2, 0x0, @rand_addr}}) [ 755.338311] audit: type=1326 audit(1529729007.337:1357): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15546 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f00000001c0), 0x4) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000300)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)}) 04:43:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000000c0)) prctl$setendian(0x14, 0x0) 04:43:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0) 04:43:27 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {}, {}, @ramp}) 04:43:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) pipe(&(0x7f0000000040)) modify_ldt$read(0x0, &(0x7f00000004c0)=""/127, 0x1f) 04:43:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) memfd_create(&(0x7f0000000100)='-{\x00', 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={'team0\x00', {0x2, 0x0, @rand_addr}}) 04:43:27 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {}, {}, @ramp}) 04:43:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0) [ 755.465672] audit: type=1326 audit(1529729007.464:1358): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15553 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000000c0)) prctl$setendian(0x14, 0x0) 04:43:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x50215}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0) 04:43:27 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {}, {}, @ramp}) 04:43:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={'team0\x00', {0x2, 0x0, @rand_addr}}) 04:43:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x50215}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0) 04:43:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) prctl$setendian(0x14, 0x0) 04:43:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000001c0), 0x0) mq_unlink(&(0x7f0000000240)='md5sum.\x00') 04:43:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={'team0\x00', {0x2, 0x0, @rand_addr}}) [ 756.273435] audit: type=1326 audit(1529729008.272:1359): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15596 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:28 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f00000001c0), 0x4) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000300)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)}) 04:43:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x50215}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0) 04:43:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {}, {}, @ramp}) 04:43:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) pipe(&(0x7f0000000040)) modify_ldt$read(0x0, &(0x7f00000004c0)=""/127, 0x1f) 04:43:28 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, "13d152363291b679f10696e883f0cfab63f267ef124599779bd2ce8ed785901d"}) 04:43:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) prctl$setendian(0x14, 0x0) 04:43:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={'team0\x00', {0x2, 0x0, @rand_addr}}) 04:43:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0) 04:43:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) prctl$setendian(0x14, 0x0) 04:43:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {}, {}, @ramp}) 04:43:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) pipe(&(0x7f0000000040)) modify_ldt$read(0x0, &(0x7f00000004c0)=""/127, 0x1f) 04:43:28 executing program 2: memfd_create(&(0x7f0000000100)='-{\x00', 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={'team0\x00', {0x2, 0x0, @rand_addr}}) 04:43:28 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, "13d152363291b679f10696e883f0cfab63f267ef124599779bd2ce8ed785901d"}) 04:43:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {}, {}, @ramp}) 04:43:29 executing program 2: memfd_create(&(0x7f0000000100)='-{\x00', 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={'team0\x00', {0x2, 0x0, @rand_addr}}) 04:43:29 executing program 0: socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000000c0)) prctl$setendian(0x14, 0x0) 04:43:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f00000001c0), 0x4) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000300)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)}) 04:43:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) pipe(&(0x7f0000000040)) modify_ldt$read(0x0, &(0x7f00000004c0)=""/127, 0x1f) 04:43:29 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, "13d152363291b679f10696e883f0cfab63f267ef124599779bd2ce8ed785901d"}) 04:43:29 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {}, {}, @ramp}) 04:43:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) accept$alg(0xffffffffffffff9c, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000040)) 04:43:29 executing program 0: socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000000c0)) prctl$setendian(0x14, 0x0) 04:43:29 executing program 2: memfd_create(&(0x7f0000000100)='-{\x00', 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={'team0\x00', {0x2, 0x0, @rand_addr}}) 04:43:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0) 04:43:29 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {}, {}, @ramp}) 04:43:29 executing program 0: socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000000c0)) prctl$setendian(0x14, 0x0) 04:43:29 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, "13d152363291b679f10696e883f0cfab63f267ef124599779bd2ce8ed785901d"}) 04:43:29 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) memfd_create(&(0x7f0000000100)='-{\x00', 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={'team0\x00', {0x2, 0x0, @rand_addr}}) 04:43:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) modify_ldt$read(0x0, &(0x7f00000004c0)=""/127, 0x1f) 04:43:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) accept$alg(0xffffffffffffff9c, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000040)) 04:43:29 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {}, {}, @ramp}) 04:43:29 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) memfd_create(&(0x7f0000000100)='-{\x00', 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={'team0\x00', {0x2, 0x0, @rand_addr}}) 04:43:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {}, {}, @ramp}) 04:43:30 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, "13d152363291b679f10696e883f0cfab63f267ef124599779bd2ce8ed785901d"}) 04:43:30 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000000c0)) prctl$setendian(0x14, 0x0) 04:43:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) modify_ldt$read(0x0, &(0x7f00000004c0)=""/127, 0x1f) 04:43:30 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) accept$alg(0xffffffffffffff9c, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000040)) 04:43:30 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) memfd_create(&(0x7f0000000100)='-{\x00', 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={'team0\x00', {0x2, 0x0, @rand_addr}}) 04:43:30 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffd000/0x1000)=nil, 0x1000}) 04:43:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0) 04:43:30 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000000c0)) prctl$setendian(0x14, 0x0) 04:43:30 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) memfd_create(&(0x7f0000000100)='-{\x00', 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={'team0\x00', {0x2, 0x0, @rand_addr}}) 04:43:30 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, "13d152363291b679f10696e883f0cfab63f267ef124599779bd2ce8ed785901d"}) 04:43:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) modify_ldt$read(0x0, &(0x7f00000004c0)=""/127, 0x1f) 04:43:30 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) accept$alg(0xffffffffffffff9c, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000040)) [ 758.633289] kauditd_printk_skb: 5 callbacks suppressed [ 758.633311] audit: type=1326 audit(1529729010.632:1365): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15734 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:30 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffd000/0x1000)=nil, 0x1000}) 04:43:30 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000000c0)) prctl$setendian(0x14, 0x0) 04:43:30 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) memfd_create(&(0x7f0000000100)='-{\x00', 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={'team0\x00', {0x2, 0x0, @rand_addr}}) 04:43:31 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, "13d152363291b679f10696e883f0cfab63f267ef124599779bd2ce8ed785901d"}) 04:43:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {}, {}, @ramp}) 04:43:31 executing program 7: pipe(&(0x7f0000000040)) modify_ldt$read(0x0, &(0x7f00000004c0)=""/127, 0x1f) 04:43:31 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000000c0)) prctl$setendian(0x14, 0x0) 04:43:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000040)) 04:43:31 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffd000/0x1000)=nil, 0x1000}) 04:43:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) memfd_create(&(0x7f0000000100)='-{\x00', 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={'team0\x00', {0x2, 0x0, @rand_addr}}) [ 759.368721] audit: type=1326 audit(1529729011.367:1366): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15769 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:31 executing program 7: pipe(&(0x7f0000000040)) modify_ldt$read(0x0, &(0x7f00000004c0)=""/127, 0x1f) 04:43:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ad}]}) memfd_create(&(0x7f0000000100)='-{\x00', 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={'team0\x00', {0x2, 0x0, @rand_addr}}) 04:43:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000040)) 04:43:31 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000000c0)) prctl$setendian(0x14, 0x0) 04:43:31 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffd000/0x1000)=nil, 0x1000}) 04:43:31 executing program 5: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, "13d152363291b679f10696e883f0cfab63f267ef124599779bd2ce8ed785901d"}) 04:43:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000080)) 04:43:31 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000000c0)) prctl$setendian(0x14, 0x0) 04:43:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ad}]}) memfd_create(&(0x7f0000000100)='-{\x00', 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={'team0\x00', {0x2, 0x0, @rand_addr}}) 04:43:31 executing program 5: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, "13d152363291b679f10696e883f0cfab63f267ef124599779bd2ce8ed785901d"}) 04:43:32 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000000c0)) prctl$setendian(0x14, 0x0) 04:43:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {}, {}, @ramp}) 04:43:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000040)) 04:43:32 executing program 5: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, "13d152363291b679f10696e883f0cfab63f267ef124599779bd2ce8ed785901d"}) 04:43:32 executing program 7: pipe(&(0x7f0000000040)) modify_ldt$read(0x0, &(0x7f00000004c0)=""/127, 0x1f) 04:43:32 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000080)) 04:43:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ad}]}) memfd_create(&(0x7f0000000100)='-{\x00', 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={'team0\x00', {0x2, 0x0, @rand_addr}}) 04:43:32 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffd000/0x1000)=nil, 0x1000}) [ 760.350593] audit: type=1326 audit(1529729012.348:1367): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15825 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) memfd_create(&(0x7f0000000100)='-{\x00', 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={'team0\x00', {0x2, 0x0, @rand_addr}}) 04:43:32 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000000c0)) prctl$setendian(0x14, 0x0) 04:43:32 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, "13d152363291b679f10696e883f0cfab63f267ef124599779bd2ce8ed785901d"}) 04:43:32 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) pipe(&(0x7f0000000040)) modify_ldt$read(0x0, &(0x7f00000004c0)=""/127, 0x1f) 04:43:32 executing program 1: accept$alg(0xffffffffffffff9c, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000040)) 04:43:32 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffd000/0x1000)=nil, 0x1000}) 04:43:32 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000080)) [ 760.537774] audit: type=1326 audit(1529729012.536:1368): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15832 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:32 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) pipe(&(0x7f0000000040)) modify_ldt$read(0x0, &(0x7f00000004c0)=""/127, 0x1f) 04:43:32 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000000c0)) prctl$setendian(0x14, 0x0) 04:43:33 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000000c0)) prctl$setendian(0x14, 0x0) 04:43:33 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, "13d152363291b679f10696e883f0cfab63f267ef124599779bd2ce8ed785901d"}) 04:43:33 executing program 1: accept$alg(0xffffffffffffff9c, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000040)) 04:43:33 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffd000/0x1000)=nil, 0x1000}) 04:43:33 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000080)) 04:43:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) getsockname(0xffffffffffffff9c, &(0x7f0000002d40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, &(0x7f0000002dc0)=0x80) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000002680)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 04:43:33 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) pipe(&(0x7f0000000040)) modify_ldt$read(0x0, &(0x7f00000004c0)=""/127, 0x1f) [ 761.306684] audit: type=1326 audit(1529729013.305:1369): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15869 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) memfd_create(&(0x7f0000000100)='-{\x00', 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={'team0\x00', {0x2, 0x0, @rand_addr}}) 04:43:33 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) pipe(&(0x7f0000000040)) modify_ldt$read(0x0, &(0x7f00000004c0)=""/127, 0x1f) 04:43:33 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, "13d152363291b679f10696e883f0cfab63f267ef124599779bd2ce8ed785901d"}) 04:43:33 executing program 1: accept$alg(0xffffffffffffff9c, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000040)) 04:43:33 executing program 6: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffd000/0x1000)=nil, 0x1000}) 04:43:33 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000080)) 04:43:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) getsockname(0xffffffffffffff9c, &(0x7f0000002d40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, &(0x7f0000002dc0)=0x80) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000002680)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) [ 761.556668] audit: type=1326 audit(1529729013.555:1370): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15893 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:33 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) pipe(&(0x7f0000000040)) modify_ldt$read(0x0, &(0x7f00000004c0)=""/127, 0x1f) 04:43:33 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000080)) 04:43:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000000c0)) prctl$setendian(0x14, 0x0) 04:43:34 executing program 6: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffd000/0x1000)=nil, 0x1000}) 04:43:34 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) accept$alg(0xffffffffffffff9c, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000040)) 04:43:34 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, "13d152363291b679f10696e883f0cfab63f267ef124599779bd2ce8ed785901d"}) 04:43:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) pipe(&(0x7f0000000040)) modify_ldt$read(0x0, &(0x7f00000004c0)=""/127, 0x1f) 04:43:34 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) getsockname(0xffffffffffffff9c, &(0x7f0000002d40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, &(0x7f0000002dc0)=0x80) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000002680)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 04:43:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000080)) [ 762.225235] audit: type=1326 audit(1529729014.223:1371): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15913 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:34 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) memfd_create(&(0x7f0000000100)='-{\x00', 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={'team0\x00', {0x2, 0x0, @rand_addr}}) 04:43:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) pipe(&(0x7f0000000040)) modify_ldt$read(0x0, &(0x7f00000004c0)=""/127, 0x1f) 04:43:34 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, "13d152363291b679f10696e883f0cfab63f267ef124599779bd2ce8ed785901d"}) 04:43:34 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) accept$alg(0xffffffffffffff9c, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000040)) 04:43:34 executing program 6: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffd000/0x1000)=nil, 0x1000}) 04:43:34 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000080)) 04:43:34 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) getsockname(0xffffffffffffff9c, &(0x7f0000002d40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, &(0x7f0000002dc0)=0x80) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000002680)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 04:43:34 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) accept$alg(0xffffffffffffff9c, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000040)) [ 762.532745] audit: type=1326 audit(1529729014.530:1372): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15944 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:34 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, "13d152363291b679f10696e883f0cfab63f267ef124599779bd2ce8ed785901d"}) 04:43:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000000c0)) prctl$setendian(0x14, 0x0) 04:43:35 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffd000/0x1000)=nil, 0x1000}) 04:43:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) pipe(&(0x7f0000000040)) modify_ldt$read(0x0, &(0x7f00000004c0)=""/127, 0x1f) 04:43:35 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000080)) 04:43:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000002680)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 04:43:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) accept$alg(0xffffffffffffff9c, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000040)) 04:43:35 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, "13d152363291b679f10696e883f0cfab63f267ef124599779bd2ce8ed785901d"}) [ 763.202392] audit: type=1326 audit(1529729015.201:1373): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15975 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:35 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, "13d152363291b679f10696e883f0cfab63f267ef124599779bd2ce8ed785901d"}) 04:43:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) accept$alg(0xffffffffffffff9c, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000040)) 04:43:35 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffd000/0x1000)=nil, 0x1000}) 04:43:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) pipe(&(0x7f0000000040)) modify_ldt$read(0x0, &(0x7f00000004c0)=""/127, 0x1f) 04:43:35 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000080)) 04:43:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000002680)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 04:43:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) setitimer(0x0, &(0x7f00000001c0), 0x0) 04:43:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) pipe(&(0x7f0000000040)) modify_ldt$read(0x0, &(0x7f00000004c0)=""/127, 0x1f) 04:43:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) accept$alg(0xffffffffffffff9c, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000040)) [ 763.595459] audit: type=1326 audit(1529729015.594:1374): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16002 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) accept$alg(0xffffffffffffff9c, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000040)) 04:43:36 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffd000/0x1000)=nil, 0x1000}) 04:43:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000002680)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 04:43:36 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) io_setup(0x0, &(0x7f0000000000)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000002c0)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'lblc\x00'}, 0x2c) 04:43:36 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000080)) 04:43:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) setitimer(0x0, &(0x7f00000001c0), 0x0) 04:43:36 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, "13d152363291b679f10696e883f0cfab63f267ef124599779bd2ce8ed785901d"}) 04:43:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) accept$alg(0xffffffffffffff9c, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000040)) 04:43:36 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, "13d152363291b679f10696e883f0cfab63f267ef124599779bd2ce8ed785901d"}) 04:43:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffd000/0x1000)=nil, 0x1000}) 04:43:36 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000080)) 04:43:36 executing program 4: getsockname(0xffffffffffffff9c, &(0x7f0000002d40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, &(0x7f0000002dc0)=0x80) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000002680)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 04:43:36 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) io_setup(0x0, &(0x7f0000000000)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000002c0)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'lblc\x00'}, 0x2c) 04:43:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) setitimer(0x0, &(0x7f00000001c0), 0x0) [ 764.369350] audit: type=1326 audit(1529729016.368:1375): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16035 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) pipe(&(0x7f0000000040)) modify_ldt$read(0x0, &(0x7f00000004c0)=""/127, 0x1f) 04:43:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) accept$alg(0xffffffffffffff9c, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000040)) 04:43:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffd000/0x1000)=nil, 0x1000}) 04:43:36 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000080)) 04:43:36 executing program 4: getsockname(0xffffffffffffff9c, &(0x7f0000002d40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, &(0x7f0000002dc0)=0x80) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000002680)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 04:43:36 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) io_setup(0x0, &(0x7f0000000000)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000002c0)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'lblc\x00'}, 0x2c) [ 764.657667] audit: type=1326 audit(1529729016.656:1376): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16064 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) setitimer(0x0, &(0x7f00000001c0), 0x0) 04:43:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) accept$alg(0xffffffffffffff9c, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000040)) 04:43:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffd000/0x1000)=nil, 0x1000}) 04:43:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000080)) [ 764.808415] audit: type=1326 audit(1529729016.807:1377): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16073 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:37 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, "13d152363291b679f10696e883f0cfab63f267ef124599779bd2ce8ed785901d"}) 04:43:37 executing program 4: getsockname(0xffffffffffffff9c, &(0x7f0000002d40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, &(0x7f0000002dc0)=0x80) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000002680)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 04:43:37 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) io_setup(0x0, &(0x7f0000000000)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000002c0)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'lblc\x00'}, 0x2c) 04:43:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) setitimer(0x0, &(0x7f00000001c0), 0x0) 04:43:37 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000080)) 04:43:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffd000/0x1000)=nil, 0x1000}) [ 765.296773] audit: type=1326 audit(1529729017.295:1378): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16098 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:37 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) pipe(&(0x7f0000000040)) modify_ldt$read(0x0, &(0x7f00000004c0)=""/127, 0x1f) 04:43:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffd000/0x1000)=nil, 0x1000}) 04:43:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) setitimer(0x0, &(0x7f00000001c0), 0x0) 04:43:37 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) personality(0x0) 04:43:37 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000080)) 04:43:37 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) getsockname(0xffffffffffffff9c, &(0x7f0000002d40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, &(0x7f0000002dc0)=0x80) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000002680)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 04:43:37 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) getsockname(0xffffffffffffff9c, &(0x7f0000002d40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, &(0x7f0000002dc0)=0x80) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000002680)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) [ 765.617221] audit: type=1326 audit(1529729017.615:1379): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16118 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:37 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) accept$alg(0xffffffffffffff9c, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000040)) 04:43:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffd000/0x1000)=nil, 0x1000}) 04:43:37 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000080)) [ 765.820718] audit: type=1326 audit(1529729017.819:1380): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16131 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:38 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, "13d152363291b679f10696e883f0cfab63f267ef124599779bd2ce8ed785901d"}) 04:43:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) setitimer(0x0, &(0x7f00000001c0), 0x0) 04:43:38 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) getsockname(0xffffffffffffff9c, &(0x7f0000002d40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, &(0x7f0000002dc0)=0x80) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000002680)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 04:43:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000007740)) 04:43:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000080)) 04:43:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffd000/0x1000)=nil, 0x1000}) [ 766.231621] audit: type=1326 audit(1529729018.230:1381): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16141 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:38 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) getsockname(0xffffffffffffff9c, &(0x7f0000002d40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, &(0x7f0000002dc0)=0x80) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000002680)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) [ 766.286189] audit: type=1326 audit(1529729018.267:1382): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16149 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:38 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) setitimer(0x0, &(0x7f00000001c0), 0x0) 04:43:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000080)) 04:43:38 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) getsockname(0xffffffffffffff9c, &(0x7f0000002d40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, &(0x7f0000002dc0)=0x80) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000002680)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 04:43:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) gettid() 04:43:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000340)=@proc={0x10}, 0xc, &(0x7f00000010c0), 0x0, &(0x7f0000001540)}, 0x0) 04:43:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000080)) 04:43:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) accept$alg(0xffffffffffffff9c, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000040)) 04:43:38 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) setitimer(0x0, &(0x7f00000001c0), 0x0) 04:43:38 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) getsockname(0xffffffffffffff9c, &(0x7f0000002d40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, &(0x7f0000002dc0)=0x80) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000002680)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) [ 766.729200] audit: type=1326 audit(1529729018.727:1383): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16177 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 766.826598] audit: type=1326 audit(1529729018.825:1384): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16187 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffd000/0x1000)=nil, 0x1000}) 04:43:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) gettid() 04:43:39 executing program 7: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x1000008000) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) sendmmsg(r1, &(0x7f000000d8c0)=[{{&(0x7f0000001840)=@nl=@proc={0x10}, 0x80, &(0x7f0000001f80), 0x0, &(0x7f0000002100)}}, {{0x0, 0x0, &(0x7f0000002040), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="4800000000000000020163bbd97c830fbcf0765dd30c000000f0000000000000001701000003000000000000000000000000760bf9a09f000000000000c6bcb78a16fc89659859090000004831d6e21114e42a7f94a749b6"], 0x58}}], 0x2, 0x0) 04:43:39 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) setitimer(0x0, &(0x7f00000001c0), 0x0) 04:43:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) getsockname(0xffffffffffffff9c, &(0x7f0000002d40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, &(0x7f0000002dc0)=0x80) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000002680)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 04:43:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000000c0)) 04:43:39 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) setitimer(0x0, &(0x7f00000001c0), 0x0) 04:43:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) getsockname(0xffffffffffffff9c, &(0x7f0000002d40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, &(0x7f0000002dc0)=0x80) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000002680)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 04:43:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) gettid() 04:43:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) 04:43:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000000c0)) 04:43:39 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) setitimer(0x0, &(0x7f00000001c0), 0x0) 04:43:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000080)) 04:43:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) 04:43:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) getsockname(0xffffffffffffff9c, &(0x7f0000002d40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, &(0x7f0000002dc0)=0x80) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000002680)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 04:43:39 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) setitimer(0x0, &(0x7f00000001c0), 0x0) 04:43:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffd000/0x1000)=nil, 0x1000}) 04:43:40 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) gettid() 04:43:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000000c0)) 04:43:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f1}]}) uname(&(0x7f0000000100)=""/74) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 04:43:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$inet_tcp(0x2, 0x1, 0x0) setitimer(0x0, &(0x7f00000001c0), 0x0) 04:43:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) getsockname(0xffffffffffffff9c, &(0x7f0000002d40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, &(0x7f0000002dc0)=0x80) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000002680)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 04:43:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) 04:43:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$inet_tcp(0x2, 0x1, 0x0) setitimer(0x0, &(0x7f00000001c0), 0x0) 04:43:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f00000000c0)={0x0, {{0x2, 0x0, @broadcast=0xffffffff}}}, 0x88) 04:43:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) 04:43:40 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) gettid() 04:43:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f1}]}) uname(&(0x7f0000000100)=""/74) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 04:43:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000080)) 04:43:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$inet_tcp(0x2, 0x1, 0x0) setitimer(0x0, &(0x7f00000001c0), 0x0) 04:43:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f00000000c0)={0x0, {{0x2, 0x0, @broadcast=0xffffffff}}}, 0x88) 04:43:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]}) keyctl$assume_authority(0x10, 0x0) 04:43:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) getsockname(0xffffffffffffff9c, &(0x7f0000002d40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, &(0x7f0000002dc0)=0x80) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000002680)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 04:43:41 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) gettid() 04:43:41 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f1}]}) uname(&(0x7f0000000100)=""/74) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 04:43:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) setitimer(0x0, &(0x7f00000001c0), 0x0) 04:43:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f00000000c0)={0x0, {{0x2, 0x0, @broadcast=0xffffffff}}}, 0x88) 04:43:41 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]}) keyctl$assume_authority(0x10, 0x0) 04:43:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000100)) 04:43:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) setitimer(0x0, &(0x7f00000001c0), 0x0) 04:43:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) prctl$setname(0xf, &(0x7f0000000280)='$cgroupsystem,em1\x00') 04:43:41 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]}) keyctl$assume_authority(0x10, 0x0) 04:43:41 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) gettid() 04:43:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f00000000c0)={0x0, {{0x2, 0x0, @broadcast=0xffffffff}}}, 0x88) 04:43:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) prctl$setname(0xf, &(0x7f0000000280)='$cgroupsystem,em1\x00') 04:43:41 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f1}]}) uname(&(0x7f0000000100)=""/74) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 04:43:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) setitimer(0x0, &(0x7f00000001c0), 0x0) 04:43:41 executing program 7: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) 04:43:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) getsockname(0xffffffffffffff9c, &(0x7f0000002d40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, &(0x7f0000002dc0)=0x80) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000002680)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 04:43:42 executing program 0: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) gettid() 04:43:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f00000000c0)={0x0, {{0x2, 0x0, @broadcast=0xffffffff}}}, 0x88) 04:43:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) 04:43:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) setitimer(0x0, &(0x7f00000001c0), 0x0) 04:43:42 executing program 7: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) 04:43:42 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f1}]}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 04:43:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) prctl$setname(0xf, &(0x7f0000000280)='$cgroupsystem,em1\x00') [ 770.103968] kauditd_printk_skb: 6 callbacks suppressed [ 770.109504] audit: type=1326 audit(1529729022.102:1391): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16359 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:42 executing program 0: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) gettid() 04:43:42 executing program 7: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) [ 770.192804] audit: type=1326 audit(1529729022.148:1392): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16367 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) prctl$setname(0xf, &(0x7f0000000280)='$cgroupsystem,em1\x00') 04:43:42 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f1}]}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 04:43:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f00000000c0)={0x0, {{0x2, 0x0, @broadcast=0xffffffff}}}, 0x88) 04:43:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) 04:43:42 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) 04:43:42 executing program 0: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) gettid() 04:43:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f00000000c0)={0x0, {{0x2, 0x0, @broadcast=0xffffffff}}}, 0x88) 04:43:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f1}]}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 04:43:43 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) prctl$setname(0xf, &(0x7f0000000280)='$cgroupsystem,em1\x00') 04:43:43 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) 04:43:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) 04:43:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) 04:43:43 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) gettid() 04:43:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) setitimer(0x0, &(0x7f00000001c0), 0x0) [ 771.110380] audit: type=1326 audit(1529729023.108:1393): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16409 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:43 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) gettid() 04:43:43 executing program 1: uname(&(0x7f0000000100)=""/74) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 04:43:43 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) 04:43:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) 04:43:43 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) prctl$setname(0xf, &(0x7f0000000280)='$cgroupsystem,em1\x00') 04:43:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) 04:43:43 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f00000000c0)={0x0, {{0x2, 0x0, @broadcast=0xffffffff}}}, 0x88) 04:43:43 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) gettid() 04:43:43 executing program 1: uname(&(0x7f0000000100)=""/74) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 04:43:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) 04:43:43 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) prctl$setname(0xf, &(0x7f0000000280)='$cgroupsystem,em1\x00') 04:43:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) 04:43:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) 04:43:43 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f00000000c0)={0x0, {{0x2, 0x0, @broadcast=0xffffffff}}}, 0x88) 04:43:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) gettid() 04:43:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) setitimer(0x0, &(0x7f00000001c0), 0x0) 04:43:44 executing program 1: uname(&(0x7f0000000100)=""/74) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 04:43:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) gettid() 04:43:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) 04:43:44 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) prctl$setname(0xf, &(0x7f0000000280)='$cgroupsystem,em1\x00') 04:43:44 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f00000000c0)={0x0, {{0x2, 0x0, @broadcast=0xffffffff}}}, 0x88) 04:43:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) 04:43:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) 04:43:44 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) prctl$setname(0xf, &(0x7f0000000280)='$cgroupsystem,em1\x00') [ 772.095586] audit: type=1326 audit(1529729024.094:1394): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16490 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) gettid() 04:43:44 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f1}]}) uname(&(0x7f0000000100)=""/74) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 04:43:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) 04:43:44 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f00000000c0)={0x0, {{0x2, 0x0, @broadcast=0xffffffff}}}, 0x88) 04:43:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) 04:43:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) 04:43:44 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) prctl$setname(0xf, &(0x7f0000000280)='$cgroupsystem,em1\x00') 04:43:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50358}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) 04:43:44 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f1}]}) uname(&(0x7f0000000100)=""/74) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 04:43:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) gettid() 04:43:44 executing program 3: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) 04:43:44 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f00000000c0)={0x0, {{0x2, 0x0, @broadcast=0xffffffff}}}, 0x88) 04:43:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) 04:43:44 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) prctl$setname(0xf, &(0x7f0000000280)='$cgroupsystem,em1\x00') 04:43:45 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x20000505a5}]}) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000340)) 04:43:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50358}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) 04:43:45 executing program 3: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) 04:43:45 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) prctl$setname(0xf, &(0x7f0000000280)='$cgroupsystem,em1\x00') 04:43:45 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f1}]}) uname(&(0x7f0000000100)=""/74) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 04:43:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) gettid() 04:43:45 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f00000000c0)={0x0, {{0x2, 0x0, @broadcast=0xffffffff}}}, 0x88) 04:43:45 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) 04:43:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50358}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) 04:43:45 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) 04:43:45 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) uname(&(0x7f0000000100)=""/74) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 04:43:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) gettid() 04:43:45 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) prctl$setname(0xf, &(0x7f0000000280)='$cgroupsystem,em1\x00') 04:43:45 executing program 3: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) 04:43:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f00000000c0)={0x0, {{0x2, 0x0, @broadcast=0xffffffff}}}, 0x88) 04:43:45 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) 04:43:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) 04:43:45 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) uname(&(0x7f0000000100)=""/74) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 04:43:45 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) 04:43:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) prctl$setname(0xf, &(0x7f0000000280)='$cgroupsystem,em1\x00') 04:43:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) gettid() 04:43:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f00000000c0)={0x0, {{0x2, 0x0, @broadcast=0xffffffff}}}, 0x88) 04:43:45 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) [ 773.678507] audit: type=1326 audit(1529729025.675:1395): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16589 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:45 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) [ 773.800954] audit: type=1326 audit(1529729025.799:1396): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16605 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:45 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) uname(&(0x7f0000000100)=""/74) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 04:43:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) prctl$setname(0xf, &(0x7f0000000280)='$cgroupsystem,em1\x00') 04:43:45 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) 04:43:45 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) 04:43:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f00000000c0)={0x0, {{0x2, 0x0, @broadcast=0xffffffff}}}, 0x88) 04:43:46 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) 04:43:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f1}]}) uname(&(0x7f0000000100)=""/74) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 04:43:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) prctl$setname(0xf, &(0x7f0000000280)='$cgroupsystem,em1\x00') 04:43:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) 04:43:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f00000000c0)={0x0, {{0x2, 0x0, @broadcast=0xffffffff}}}, 0x88) 04:43:46 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) 04:43:46 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) [ 774.620074] audit: type=1326 audit(1529729026.618:1397): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16651 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:46 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) gettid() 04:43:46 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) 04:43:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f1}]}) uname(&(0x7f0000000100)=""/74) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 04:43:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) prctl$setname(0xf, &(0x7f0000000280)='$cgroupsystem,em1\x00') 04:43:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f00000000c0)={0x0, {{0x2, 0x0, @broadcast=0xffffffff}}}, 0x88) 04:43:46 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) 04:43:46 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) [ 774.761599] audit: type=1326 audit(1529729026.760:1398): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16659 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f00000000c0)={0x0, {{0x2, 0x0, @broadcast=0xffffffff}}}, 0x88) 04:43:46 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) 04:43:46 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) 04:43:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) prctl$setname(0xf, &(0x7f0000000280)='$cgroupsystem,em1\x00') 04:43:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f1}]}) uname(&(0x7f0000000100)=""/74) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 04:43:47 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) prctl$setname(0xf, &(0x7f0000000280)='$cgroupsystem,em1\x00') 04:43:47 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) 04:43:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) 04:43:47 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) [ 775.573914] audit: type=1326 audit(1529729027.571:1399): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16701 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:47 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f00000000c0)={0x0, {{0x2, 0x0, @broadcast=0xffffffff}}}, 0x88) 04:43:47 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) prctl$setname(0xf, &(0x7f0000000280)='$cgroupsystem,em1\x00') 04:43:47 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) 04:43:47 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) uname(&(0x7f0000000100)=""/74) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 04:43:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) gettid() 04:43:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) 04:43:47 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) [ 775.693716] audit: type=1326 audit(1529729027.692:1400): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16708 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:47 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) [ 775.777090] audit: type=1326 audit(1529729027.713:1401): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16709 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 775.797092] audit: type=1326 audit(1529729027.732:1402): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16712 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) 04:43:47 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) [ 775.816826] audit: type=1326 audit(1529729027.745:1403): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16719 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:47 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) 04:43:47 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) 04:43:47 executing program 2: socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) 04:43:48 executing program 2: socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) 04:43:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) 04:43:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) [ 776.517709] audit: type=1326 audit(1529729028.514:1404): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16746 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f00000000c0)={0x0, {{0x2, 0x0, @broadcast=0xffffffff}}}, 0x88) 04:43:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) uname(&(0x7f0000000100)=""/74) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 04:43:48 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f0000001700)) 04:43:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) 04:43:48 executing program 2: socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) 04:43:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) prctl$setname(0xf, &(0x7f0000000280)='$cgroupsystem,em1\x00') 04:43:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) [ 776.716677] audit: type=1326 audit(1529729028.715:1405): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16759 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:48 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) 04:43:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) [ 776.789412] audit: type=1326 audit(1529729028.747:1406): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16761 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:48 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f0000001700)) [ 776.880335] audit: type=1326 audit(1529729028.878:1407): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16767 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) getpid() 04:43:48 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) 04:43:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) [ 777.026240] audit: type=1326 audit(1529729029.024:1408): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16789 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f0000001700)) 04:43:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) 04:43:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) getpid() 04:43:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f00000000c0)={0x0, {{0x2, 0x0, @broadcast=0xffffffff}}}, 0x88) 04:43:49 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) 04:43:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f0000001700)) 04:43:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) getpid() 04:43:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) prctl$setname(0xf, &(0x7f0000000280)='$cgroupsystem,em1\x00') 04:43:49 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) uname(&(0x7f0000000100)=""/74) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 04:43:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) 04:43:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f0000001700)) 04:43:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) 04:43:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) getpid() 04:43:49 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) 04:43:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) 04:43:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f0000001700)) 04:43:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) getpid() 04:43:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) 04:43:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) 04:43:50 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 04:43:50 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f0000001700)) 04:43:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) getpid() 04:43:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) 04:43:50 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) prctl$setptracer(0x59616d61, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000340)={'syz1'}, 0x4) 04:43:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) 04:43:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) 04:43:50 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) getresgid(&(0x7f0000000040), &(0x7f00000001c0), &(0x7f0000000200)) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) 04:43:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) getpid() 04:43:50 executing program 7: open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f0000001700)) 04:43:50 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) 04:43:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) 04:43:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) 04:43:50 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 04:43:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 04:43:51 executing program 7: open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f0000001700)) 04:43:51 executing program 0: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) getpid() 04:43:51 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) getresgid(&(0x7f0000000040), &(0x7f00000001c0), &(0x7f0000000200)) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) 04:43:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@multicast2, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000580)=0xe8) 04:43:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) 04:43:51 executing program 7: open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f0000001700)) 04:43:51 executing program 0: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) getpid() 04:43:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) 04:43:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 04:43:51 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) 04:43:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f00000000c0)) 04:43:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) 04:43:51 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f0000001700)) 04:43:51 executing program 0: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) getpid() 04:43:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) 04:43:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 04:43:51 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) 04:43:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f00000000c0)) 04:43:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50353}]}) socket$inet(0x2, 0x0, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000080)=""/146) 04:43:52 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f0000001700)) 04:43:52 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) getpid() 04:43:52 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 04:43:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f00000000c0)) 04:43:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) 04:43:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) 04:43:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50353}]}) socket$inet(0x2, 0x0, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000080)=""/146) 04:43:52 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f0000001700)) 04:43:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) 04:43:52 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) getpid() 04:43:52 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 04:43:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f00000000c0)) 04:43:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) 04:43:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) 04:43:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f0000001700)) 04:43:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50353}]}) socket$inet(0x2, 0x0, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000080)=""/146) 04:43:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f0000001700)) [ 780.950139] kauditd_printk_skb: 9 callbacks suppressed [ 780.950167] audit: type=1326 audit(1529729032.948:1418): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17015 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:53 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) getpid() 04:43:53 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 04:43:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f00000000c0)) 04:43:53 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50353}]}) socket$inet(0x2, 0x0, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000080)=""/146) 04:43:53 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) 04:43:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) 04:43:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f0000001700)) 04:43:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f0000001700)) 04:43:53 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 04:43:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) getpid() 04:43:53 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) 04:43:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f00000000c0)) 04:43:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:43:53 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50353}]}) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000080)=""/146) 04:43:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) 04:43:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f0000001700)) 04:43:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) getpid() 04:43:54 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 04:43:54 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) 04:43:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f00000000c0)) 04:43:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) 04:43:54 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50353}]}) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000080)=""/146) 04:43:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:43:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f0000001700)) 04:43:54 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f00000000c0)) 04:43:54 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 04:43:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) getpid() 04:43:54 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) 04:43:54 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50353}]}) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000080)=""/146) 04:43:54 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) 04:43:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) getpid() 04:43:54 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 04:43:54 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) 04:43:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f0000001700)) 04:43:54 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f00000000c0)) 04:43:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:43:54 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) 04:43:54 executing program 4: socket$inet(0x2, 0x0, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000080)=""/146) 04:43:54 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) [ 782.675164] audit: type=1326 audit(1529729034.673:1419): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17131 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) getpid() 04:43:54 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) 04:43:54 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f00000000c0)) 04:43:54 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) 04:43:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:43:54 executing program 4: socket$inet(0x2, 0x0, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000080)=""/146) 04:43:54 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 04:43:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) 04:43:55 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) getpid() 04:43:55 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f00000000c0)) 04:43:55 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f0000001700)) 04:43:55 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) 04:43:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:43:55 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 04:43:55 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) 04:43:55 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) getpid() 04:43:55 executing program 4: socket$inet(0x2, 0x0, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000080)=""/146) 04:43:55 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f00000000c0)) [ 783.581398] audit: type=1326 audit(1529729035.580:1420): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17184 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 783.639829] audit: type=1326 audit(1529729035.638:1421): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17187 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:55 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f00000000c0)) 04:43:55 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) 04:43:55 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 04:43:55 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) 04:43:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:43:55 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50353}]}) socket$inet(0x2, 0x0, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000080)=""/146) 04:43:55 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) 04:43:55 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 04:43:56 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:43:56 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50353}]}) socket$inet(0x2, 0x0, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000080)=""/146) 04:43:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f00000000c0)) 04:43:56 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f0000001700)) 04:43:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 04:43:56 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) 04:43:56 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) getpid() 04:43:56 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) [ 784.547820] audit: type=1326 audit(1529729036.546:1422): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17247 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f00000000c0)) 04:43:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 04:43:56 executing program 2: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) [ 784.653913] audit: type=1326 audit(1529729036.652:1423): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17255 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:56 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) 04:43:56 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50353}]}) socket$inet(0x2, 0x0, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000080)=""/146) 04:43:56 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) 04:43:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 04:43:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f00000000c0)) 04:43:56 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) [ 784.954921] audit: type=1326 audit(1529729036.953:1424): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17278 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f00000000c0)) 04:43:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) 04:43:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) 04:43:57 executing program 2: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:43:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)) socket$inet(0x2, 0x0, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000080)=""/146) 04:43:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) getpid() 04:43:57 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) close(0xffffffffffffffff) 04:43:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) 04:43:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f00000000c0)) 04:43:57 executing program 2: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:43:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) 04:43:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)) socket$inet(0x2, 0x0, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000080)=""/146) [ 785.676915] audit: type=1326 audit(1529729037.675:1425): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17311 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:57 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) [ 785.767120] audit: type=1326 audit(1529729037.763:1426): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17318 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 04:43:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f00000000c0)) 04:43:57 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) sync() 04:43:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) 04:43:57 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:43:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)) socket$inet(0x2, 0x0, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000080)=""/146) 04:43:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f00000000c0)) [ 785.954096] audit: type=1326 audit(1529729037.952:1427): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17342 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) [ 786.079845] audit: type=1326 audit(1529729038.078:1428): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17349 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 786.145476] audit: type=1326 audit(1529729038.140:1429): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17356 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) 04:43:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) sync() 04:43:58 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:43:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) dup(0xffffffffffffff9c) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 04:43:58 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50353}]}) socket$inet(0x2, 0x0, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000080)=""/146) [ 786.650216] audit: type=1326 audit(1529729038.647:1430): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17366 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:43:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) sync() 04:43:58 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50353}]}) socket$inet(0x2, 0x0, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000080)=""/146) 04:43:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 04:43:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) dup(0xffffffffffffff9c) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 04:43:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:43:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) sync() [ 786.991817] audit: type=1326 audit(1529729038.990:1431): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17398 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f00000000c0)) 04:43:59 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50353}]}) socket$inet(0x2, 0x0, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000080)=""/146) 04:43:59 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) 04:43:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) dup(0xffffffffffffff9c) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) [ 787.113899] audit: type=1326 audit(1529729039.112:1432): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17406 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 787.223498] audit: type=1326 audit(1529729039.172:1433): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17411 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:59 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) 04:43:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:43:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) sync() 04:43:59 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000080)=""/146) 04:43:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) dup(0xffffffffffffff9c) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) [ 787.580900] audit: type=1326 audit(1529729039.579:1434): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17426 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:43:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) sync() [ 787.631143] audit: type=1326 audit(1529729039.607:1435): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17432 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:43:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 04:43:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:43:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) sync() 04:43:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 04:43:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sync() 04:44:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:44:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f00000000c0)) 04:44:00 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) 04:44:00 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) [ 788.102466] audit: type=1326 audit(1529729040.101:1436): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17464 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:00 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000080)=""/146) 04:44:00 executing program 7: socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) sync() 04:44:00 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50232}]}) times(&(0x7f0000000480)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:44:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:44:00 executing program 0: dup(0xffffffffffffff9c) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 04:44:00 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) rt_sigaction(0x0, &(0x7f0000000200), &(0x7f0000000240), 0x8, &(0x7f0000000280)) 04:44:00 executing program 0: dup(0xffffffffffffff9c) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 04:44:00 executing program 7: socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) sync() 04:44:00 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50232}]}) times(&(0x7f0000000480)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:44:00 executing program 7: socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) sync() 04:44:00 executing program 0: dup(0xffffffffffffff9c) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 04:44:00 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) rt_sigaction(0x0, &(0x7f0000000200), &(0x7f0000000240), 0x8, &(0x7f0000000280)) 04:44:00 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) dup(0xffffffffffffff9c) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 04:44:01 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) dup(0xffffffffffffff9c) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 04:44:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50193}]}) openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000600)) 04:44:01 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000180)) 04:44:01 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000080)=""/146) 04:44:01 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) sync() 04:44:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) rt_sigaction(0x0, &(0x7f0000000200), &(0x7f0000000240), 0x8, &(0x7f0000000280)) 04:44:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:44:01 executing program 6: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000100)) syz_emit_ethernet(0xfed1, &(0x7f000000a000)={@broadcast=[0xff, 0xe0, 0xff, 0xff, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x11, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, @multicast1=0xe0000001}, @udp={0x0, 0x883e, 0x8}}}}}, 0x0) 04:44:01 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000180)) 04:44:01 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) dup(0xffffffffffffff9c) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 04:44:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50193}]}) openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000600)) [ 789.542467] ip_tunnel: non-ECT from 172.20.255.187 with TOS=0x1 04:44:01 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) sync() [ 789.585605] ip_tunnel: non-ECT from 172.20.255.187 with TOS=0x1 04:44:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) ustat(0x0, &(0x7f0000000000)) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f0000000340)) 04:44:01 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) dup(0xffffffffffffff9c) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 04:44:01 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000180)) 04:44:01 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) 04:44:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50193}]}) openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000600)) 04:44:01 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) sync() 04:44:01 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) dup(0xffffffffffffff9c) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 04:44:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) dup(0xffffffffffffff9c) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 04:44:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpu.stat\x00', 0x0, 0x0) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000040)) 04:44:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50193}]}) openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000600)) 04:44:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:44:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) 04:44:02 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) sync() 04:44:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000180)) 04:44:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) 04:44:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]}) dup(0xffffffffffffff9c) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 04:44:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50193}]}) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000600)) 04:44:02 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000)) inotify_init() 04:44:02 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) sync() 04:44:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) 04:44:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000180)) 04:44:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) 04:44:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]}) dup(0xffffffffffffff9c) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 04:44:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50193}]}) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000600)) 04:44:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) 04:44:03 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='pids.events\x00', 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) 04:44:03 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='pids.events\x00', 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) 04:44:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) sync() 04:44:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000180)) 04:44:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000ffa000/0x4000)=nil, 0x4000}}) 04:44:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]}) dup(0xffffffffffffff9c) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 04:44:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) 04:44:03 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50193}]}) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000600)) 04:44:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) 04:44:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) sync() 04:44:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000180)) 04:44:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) dup(0xffffffffffffff9c) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 04:44:03 executing program 3: openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000600)) 04:44:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) 04:44:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) 04:44:03 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='pids.events\x00', 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) [ 791.837908] kauditd_printk_skb: 6 callbacks suppressed [ 791.837932] audit: type=1326 audit(1529729043.836:1443): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17682 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000ffa000/0x4000)=nil, 0x4000}}) 04:44:04 executing program 1: openat$rtc(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000180)) 04:44:04 executing program 3: openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000600)) 04:44:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) sync() 04:44:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) 04:44:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) 04:44:04 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='pids.events\x00', 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) 04:44:04 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000ffa000/0x4000)=nil, 0x4000}}) 04:44:04 executing program 1: openat$rtc(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000180)) 04:44:04 executing program 3: openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000600)) 04:44:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) sync() 04:44:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) dup(0xffffffffffffff9c) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 04:44:04 executing program 6: syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) 04:44:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) 04:44:04 executing program 1: openat$rtc(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000180)) 04:44:04 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000ffa000/0x4000)=nil, 0x4000}}) 04:44:04 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50193}]}) openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000600)) 04:44:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) sync() 04:44:04 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) [ 792.820866] audit: type=1326 audit(1529729044.819:1444): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17752 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:04 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000180)) [ 792.898394] audit: type=1326 audit(1529729044.868:1445): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17753 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) 04:44:04 executing program 6: syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) 04:44:04 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50193}]}) openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000600)) 04:44:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000ffa000/0x4000)=nil, 0x4000}}) 04:44:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) 04:44:05 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000180)) 04:44:05 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50193}]}) openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000600)) 04:44:05 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) dup(0xffffffffffffff9c) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 04:44:05 executing program 6: syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) 04:44:05 executing program 4: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) 04:44:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000ffa000/0x4000)=nil, 0x4000}}) 04:44:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) 04:44:05 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000180)) 04:44:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000600)) 04:44:05 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) sync() [ 793.800748] audit: type=1326 audit(1529729045.799:1446): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17793 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:05 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000180)) 04:44:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000600)) [ 793.884528] audit: type=1326 audit(1529729045.832:1447): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17802 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:05 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) 04:44:05 executing program 4: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) 04:44:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000ffa000/0x4000)=nil, 0x4000}}) 04:44:06 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='pids.events\x00', 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) 04:44:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000180)) 04:44:06 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000600)) 04:44:06 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) sync() 04:44:06 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) 04:44:06 executing program 4: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) 04:44:06 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='pids.events\x00', 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) 04:44:06 executing program 2: socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000ffa000/0x4000)=nil, 0x4000}}) 04:44:06 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000400), 0x0, 0x0, &(0x7f0000000380), 0x8) 04:44:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000180)) 04:44:06 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50193}]}) openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000600)) [ 794.797187] audit: type=1326 audit(1529729046.795:1448): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17840 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:06 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50193}]}) openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000600)) 04:44:06 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) 04:44:06 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='pids.events\x00', 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) 04:44:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000180)) 04:44:06 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) 04:44:06 executing program 2: socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000ffa000/0x4000)=nil, 0x4000}}) 04:44:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000400), 0x0, 0x0, &(0x7f0000000380), 0x8) 04:44:07 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50193}]}) openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000600)) 04:44:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) 04:44:07 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='pids.events\x00', 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) 04:44:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000400), 0x0, 0x0, &(0x7f0000000380), 0x8) 04:44:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000180)) 04:44:07 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) 04:44:07 executing program 2: socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000ffa000/0x4000)=nil, 0x4000}}) 04:44:07 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000600)) 04:44:07 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000140)) [ 795.745884] audit: type=1326 audit(1529729047.744:1449): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17896 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:07 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='pids.events\x00', 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) 04:44:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000180)) 04:44:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000400), 0x0, 0x0, &(0x7f0000000380), 0x8) 04:44:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) 04:44:07 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) 04:44:07 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000ffa000/0x4000)=nil, 0x4000}}) 04:44:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000140)) 04:44:08 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='pids.events\x00', 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) 04:44:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) 04:44:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000180)) 04:44:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) 04:44:08 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) epoll_pwait(0xffffffffffffffff, &(0x7f0000000400), 0x0, 0x0, &(0x7f0000000380), 0x8) 04:44:08 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000ffa000/0x4000)=nil, 0x4000}}) 04:44:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) [ 796.223937] audit: type=1326 audit(1529729048.222:1450): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17939 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:08 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000600)) 04:44:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000140)) 04:44:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='pids.events\x00', 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) 04:44:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) 04:44:08 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) epoll_pwait(0xffffffffffffffff, &(0x7f0000000400), 0x0, 0x0, &(0x7f0000000380), 0x8) 04:44:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) 04:44:08 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000ffa000/0x4000)=nil, 0x4000}}) [ 796.715827] audit: type=1326 audit(1529729048.714:1451): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17975 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) 04:44:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000ffa000/0x4000)=nil, 0x4000}}) 04:44:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) 04:44:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='pids.events\x00', 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) 04:44:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000180)) 04:44:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) epoll_pwait(0xffffffffffffffff, &(0x7f0000000400), 0x0, 0x0, &(0x7f0000000380), 0x8) 04:44:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000140)) 04:44:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) 04:44:09 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) [ 797.118663] audit: type=1326 audit(1529729049.117:1452): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17999 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 797.169678] audit: type=1326 audit(1529729049.152:1453): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18006 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:09 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000600)) 04:44:09 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='pids.events\x00', 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) 04:44:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000ffa000/0x4000)=nil, 0x4000}}) 04:44:09 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) 04:44:09 executing program 0: openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000400), 0x0, 0x0, &(0x7f0000000380), 0x8) 04:44:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000140)) 04:44:09 executing program 0: openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000400), 0x0, 0x0, &(0x7f0000000380), 0x8) [ 797.688808] audit: type=1326 audit(1529729049.687:1454): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18024 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000140)) 04:44:09 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='pids.events\x00', 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) 04:44:09 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) 04:44:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000ffa000/0x4000)=nil, 0x4000}}) 04:44:10 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000140)) 04:44:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000ffa000/0x4000)=nil, 0x4000}}) 04:44:10 executing program 0: openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000400), 0x0, 0x0, &(0x7f0000000380), 0x8) 04:44:10 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000180)) 04:44:10 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) [ 798.098658] audit: type=1326 audit(1529729050.097:1455): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18052 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 798.148058] audit: type=1326 audit(1529729050.132:1456): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18059 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:10 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='pids.events\x00', 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) 04:44:10 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) 04:44:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000ffa000/0x4000)=nil, 0x4000}}) 04:44:10 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000400), 0x0, 0x0, &(0x7f0000000380), 0x8) 04:44:10 executing program 7: syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000140)) 04:44:10 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'ip6gre0\x00', @ifru_data=&(0x7f0000000000)="2ff00146fbd0aa6bb716c5bbdd4260e89b4d0ff1ce12369fe5e26ec2633948bf"}) [ 798.635590] audit: type=1326 audit(1529729050.634:1457): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18067 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:10 executing program 7: syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000140)) 04:44:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000ffa000/0x4000)=nil, 0x4000}}) 04:44:10 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='pids.events\x00', 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) 04:44:10 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000400), 0x0, 0x0, &(0x7f0000000380), 0x8) 04:44:10 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='pids.events\x00', 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) 04:44:10 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000400), 0x0, 0x0, &(0x7f0000000380), 0x8) [ 798.940907] audit: type=1326 audit(1529729050.939:1458): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18096 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:11 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000400), 0x0, 0x0, &(0x7f0000000380), 0x8) 04:44:11 executing program 7: syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000140)) 04:44:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000ffa000/0x4000)=nil, 0x4000}}) 04:44:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) 04:44:11 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'ip6gre0\x00', @ifru_data=&(0x7f0000000000)="2ff00146fbd0aa6bb716c5bbdd4260e89b4d0ff1ce12369fe5e26ec2633948bf"}) [ 799.089650] audit: type=1326 audit(1529729051.088:1459): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18108 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 799.128315] audit: type=1326 audit(1529729051.110:1460): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18111 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) 04:44:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) accept(0xffffffffffffff9c, &(0x7f0000000140)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) clock_settime(0x0, &(0x7f00000015c0)) 04:44:11 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000140)) 04:44:11 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000400), 0x0, 0x0, &(0x7f0000000380), 0x8) 04:44:11 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'ip6gre0\x00', @ifru_data=&(0x7f0000000000)="2ff00146fbd0aa6bb716c5bbdd4260e89b4d0ff1ce12369fe5e26ec2633948bf"}) [ 799.578514] audit: type=1326 audit(1529729051.577:1461): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18123 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:11 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000140)) 04:44:11 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000400), 0x0, 0x0, &(0x7f0000000380), 0x8) 04:44:11 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'ip6gre0\x00', @ifru_data=&(0x7f0000000000)="2ff00146fbd0aa6bb716c5bbdd4260e89b4d0ff1ce12369fe5e26ec2633948bf"}) 04:44:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) accept(0xffffffffffffff9c, &(0x7f0000000140)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) clock_settime(0x0, &(0x7f00000015c0)) 04:44:11 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='pids.events\x00', 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) 04:44:11 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000140)) 04:44:11 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000400), 0x0, 0x0, &(0x7f0000000380), 0x8) 04:44:12 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'ip6gre0\x00', @ifru_data=&(0x7f0000000000)="2ff00146fbd0aa6bb716c5bbdd4260e89b4d0ff1ce12369fe5e26ec2633948bf"}) 04:44:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000ffa000/0x4000)=nil, 0x4000}}) 04:44:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) accept(0xffffffffffffff9c, &(0x7f0000000140)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) clock_settime(0x0, &(0x7f00000015c0)) 04:44:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) dup(0xffffffffffffffff) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x4) 04:44:12 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000140)) 04:44:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000400), 0x0, 0x0, &(0x7f0000000380), 0x8) 04:44:12 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'ip6gre0\x00', @ifru_data=&(0x7f0000000000)="2ff00146fbd0aa6bb716c5bbdd4260e89b4d0ff1ce12369fe5e26ec2633948bf"}) 04:44:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) accept(0xffffffffffffff9c, &(0x7f0000000140)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) clock_settime(0x0, &(0x7f00000015c0)) 04:44:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) dup(0xffffffffffffffff) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x4) 04:44:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) 04:44:12 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000140)) 04:44:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000400), 0x0, 0x0, &(0x7f0000000380), 0x8) 04:44:12 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'ip6gre0\x00', @ifru_data=&(0x7f0000000000)="2ff00146fbd0aa6bb716c5bbdd4260e89b4d0ff1ce12369fe5e26ec2633948bf"}) 04:44:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='pids.events\x00', 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) 04:44:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) dup(0xffffffffffffffff) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x4) 04:44:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) clock_settime(0x0, &(0x7f00000015c0)) 04:44:12 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000140)) 04:44:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000ffa000/0x4000)=nil, 0x4000}}) 04:44:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000400), 0x0, 0x0, &(0x7f0000000380), 0x8) 04:44:13 executing program 3: socket$inet6(0xa, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'ip6gre0\x00', @ifru_data=&(0x7f0000000000)="2ff00146fbd0aa6bb716c5bbdd4260e89b4d0ff1ce12369fe5e26ec2633948bf"}) 04:44:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) clock_settime(0x0, &(0x7f00000015c0)) 04:44:13 executing program 3: socket$inet6(0xa, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'ip6gre0\x00', @ifru_data=&(0x7f0000000000)="2ff00146fbd0aa6bb716c5bbdd4260e89b4d0ff1ce12369fe5e26ec2633948bf"}) 04:44:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) dup(0xffffffffffffffff) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x4) 04:44:13 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpu.stat\x00', 0x0, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 04:44:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000140)) 04:44:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000140)) 04:44:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) clock_settime(0x0, &(0x7f00000015c0)) 04:44:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x4) 04:44:13 executing program 3: socket$inet6(0xa, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'ip6gre0\x00', @ifru_data=&(0x7f0000000000)="2ff00146fbd0aa6bb716c5bbdd4260e89b4d0ff1ce12369fe5e26ec2633948bf"}) 04:44:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000140)) 04:44:13 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000200), 0x8) 04:44:13 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0x0) 04:44:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x4) 04:44:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000400), 0x0, 0x0, &(0x7f0000000380), 0x8) 04:44:14 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'ip6gre0\x00', @ifru_data=&(0x7f0000000000)="2ff00146fbd0aa6bb716c5bbdd4260e89b4d0ff1ce12369fe5e26ec2633948bf"}) 04:44:14 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000140)) 04:44:14 executing program 1: accept(0xffffffffffffff9c, &(0x7f0000000140)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) clock_settime(0x0, &(0x7f00000015c0)) 04:44:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) finit_module(0xffffffffffffffff, &(0x7f0000000040)=',cgroupvboxnet1+lobdevposix_acl_access\x00', 0x0) 04:44:14 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x4) 04:44:14 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000200), 0x8) [ 802.164230] kauditd_printk_skb: 6 callbacks suppressed [ 802.164251] audit: type=1326 audit(1529729054.162:1468): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18277 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:14 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0x0) 04:44:14 executing program 1: accept(0xffffffffffffff9c, &(0x7f0000000140)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) clock_settime(0x0, &(0x7f00000015c0)) [ 802.304636] audit: type=1326 audit(1529729054.193:1469): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18283 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:14 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000200), 0x8) 04:44:14 executing program 6: dup(0xffffffffffffffff) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x4) 04:44:14 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'ip6gre0\x00', @ifru_data=&(0x7f0000000000)="2ff00146fbd0aa6bb716c5bbdd4260e89b4d0ff1ce12369fe5e26ec2633948bf"}) 04:44:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) finit_module(0xffffffffffffffff, &(0x7f0000000040)=',cgroupvboxnet1+lobdevposix_acl_access\x00', 0x0) 04:44:14 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0x0) 04:44:14 executing program 1: accept(0xffffffffffffff9c, &(0x7f0000000140)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) clock_settime(0x0, &(0x7f00000015c0)) 04:44:14 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000200), 0x8) 04:44:15 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000400), 0x0, 0x0, &(0x7f0000000380), 0x8) 04:44:15 executing program 6: dup(0xffffffffffffffff) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x4) 04:44:15 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'ip6gre0\x00', @ifru_data=&(0x7f0000000000)="2ff00146fbd0aa6bb716c5bbdd4260e89b4d0ff1ce12369fe5e26ec2633948bf"}) 04:44:15 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000040)) 04:44:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) finit_module(0xffffffffffffffff, &(0x7f0000000040)=',cgroupvboxnet1+lobdevposix_acl_access\x00', 0x0) 04:44:15 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) accept(0xffffffffffffff9c, &(0x7f0000000140)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) clock_settime(0x0, &(0x7f00000015c0)) 04:44:15 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) epoll_pwait(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000200), 0x8) 04:44:15 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000140)) [ 803.134560] audit: type=1326 audit(1529729055.133:1470): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18346 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:15 executing program 6: dup(0xffffffffffffffff) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x4) [ 803.206427] audit: type=1326 audit(1529729055.193:1471): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18344 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:15 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) accept(0xffffffffffffff9c, &(0x7f0000000140)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) clock_settime(0x0, &(0x7f00000015c0)) 04:44:15 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) epoll_pwait(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000200), 0x8) 04:44:15 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'ip6gre0\x00', @ifru_data=&(0x7f0000000000)="2ff00146fbd0aa6bb716c5bbdd4260e89b4d0ff1ce12369fe5e26ec2633948bf"}) 04:44:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) finit_module(0xffffffffffffffff, &(0x7f0000000040)=',cgroupvboxnet1+lobdevposix_acl_access\x00', 0x0) 04:44:15 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000040)) 04:44:15 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) dup(0xffffffffffffffff) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x4) 04:44:15 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) accept(0xffffffffffffff9c, &(0x7f0000000140)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) clock_settime(0x0, &(0x7f00000015c0)) 04:44:16 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000140)) 04:44:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) epoll_pwait(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000200), 0x8) 04:44:16 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'ip6gre0\x00', @ifru_data=&(0x7f0000000000)="2ff00146fbd0aa6bb716c5bbdd4260e89b4d0ff1ce12369fe5e26ec2633948bf"}) 04:44:16 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) dup(0xffffffffffffffff) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x4) 04:44:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) finit_module(0xffffffffffffffff, &(0x7f0000000040)=',cgroupvboxnet1+lobdevposix_acl_access\x00', 0x0) 04:44:16 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) semget(0xffffffffffffffff, 0x0, 0x0) 04:44:16 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000040)) 04:44:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) accept(0xffffffffffffff9c, &(0x7f0000000140)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) clock_settime(0x0, &(0x7f00000015c0)) [ 804.078158] audit: type=1326 audit(1529729056.076:1472): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18395 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) accept(0xffffffffffffff9c, &(0x7f0000000140)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) clock_settime(0x0, &(0x7f00000015c0)) 04:44:16 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) dup(0xffffffffffffffff) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x4) 04:44:16 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000200), 0x8) 04:44:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) finit_module(0xffffffffffffffff, &(0x7f0000000040)=',cgroupvboxnet1+lobdevposix_acl_access\x00', 0x0) 04:44:16 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'ip6gre0\x00', @ifru_data=&(0x7f0000000000)="2ff00146fbd0aa6bb716c5bbdd4260e89b4d0ff1ce12369fe5e26ec2633948bf"}) 04:44:16 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) semget(0xffffffffffffffff, 0x0, 0x0) 04:44:16 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000040)) 04:44:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) dup(0xffffffffffffffff) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x4) 04:44:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) finit_module(0xffffffffffffffff, &(0x7f0000000040)=',cgroupvboxnet1+lobdevposix_acl_access\x00', 0x0) 04:44:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) accept(0xffffffffffffff9c, &(0x7f0000000140)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) clock_settime(0x0, &(0x7f00000015c0)) 04:44:16 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000200), 0x8) 04:44:16 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) semget(0xffffffffffffffff, 0x0, 0x0) 04:44:16 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000040)) 04:44:16 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'ip6gre0\x00', @ifru_data=&(0x7f0000000000)="2ff00146fbd0aa6bb716c5bbdd4260e89b4d0ff1ce12369fe5e26ec2633948bf"}) 04:44:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) dup(0xffffffffffffffff) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x4) 04:44:16 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x20000505a5}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) semctl$IPC_INFO(0x0, 0x0, 0x3, &(0x7f0000000280)=""/177) 04:44:17 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000200), 0x8) 04:44:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) accept(0xffffffffffffff9c, &(0x7f0000000140)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) clock_settime(0x0, &(0x7f00000015c0)) 04:44:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) dup(0xffffffffffffffff) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x4) 04:44:17 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000040)) 04:44:17 executing program 2: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) finit_module(0xffffffffffffffff, &(0x7f0000000040)=',cgroupvboxnet1+lobdevposix_acl_access\x00', 0x0) 04:44:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) semget(0xffffffffffffffff, 0x0, 0x0) 04:44:17 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'ip6gre0\x00', @ifru_data=&(0x7f0000000000)="2ff00146fbd0aa6bb716c5bbdd4260e89b4d0ff1ce12369fe5e26ec2633948bf"}) 04:44:17 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x20000505a5}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) semctl$IPC_INFO(0x0, 0x0, 0x3, &(0x7f0000000280)=""/177) 04:44:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) accept(0xffffffffffffff9c, &(0x7f0000000140)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) clock_settime(0x0, &(0x7f00000015c0)) 04:44:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) dup(0xffffffffffffffff) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x4) 04:44:17 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000200), 0x8) 04:44:17 executing program 2: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) finit_module(0xffffffffffffffff, &(0x7f0000000040)=',cgroupvboxnet1+lobdevposix_acl_access\x00', 0x0) 04:44:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) accept(0xffffffffffffff9c, &(0x7f0000000140)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) clock_settime(0x0, &(0x7f00000015c0)) 04:44:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) dup(0xffffffffffffffff) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x4) 04:44:17 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000040)) 04:44:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) semget(0xffffffffffffffff, 0x0, 0x0) 04:44:17 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000200), 0x8) 04:44:17 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x20000505a5}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) semctl$IPC_INFO(0x0, 0x0, 0x3, &(0x7f0000000280)=""/177) 04:44:17 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'ip6gre0\x00', @ifru_data=&(0x7f0000000000)="2ff00146fbd0aa6bb716c5bbdd4260e89b4d0ff1ce12369fe5e26ec2633948bf"}) 04:44:17 executing program 2: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) finit_module(0xffffffffffffffff, &(0x7f0000000040)=',cgroupvboxnet1+lobdevposix_acl_access\x00', 0x0) 04:44:17 executing program 5: socket$inet6(0xa, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000040)) 04:44:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) dup(0xffffffffffffffff) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x4) 04:44:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) accept(0xffffffffffffff9c, &(0x7f0000000140)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) clock_settime(0x0, &(0x7f00000015c0)) 04:44:17 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000200), 0x8) 04:44:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) semget(0xffffffffffffffff, 0x0, 0x0) 04:44:17 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x20000505a5}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) semctl$IPC_INFO(0x0, 0x0, 0x3, &(0x7f0000000280)=""/177) [ 805.932637] audit: type=1326 audit(1529729057.931:1473): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18533 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:18 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'ip6gre0\x00', @ifru_data=&(0x7f0000000000)="2ff00146fbd0aa6bb716c5bbdd4260e89b4d0ff1ce12369fe5e26ec2633948bf"}) 04:44:18 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) finit_module(0xffffffffffffffff, &(0x7f0000000040)=',cgroupvboxnet1+lobdevposix_acl_access\x00', 0x0) 04:44:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) dup(0xffffffffffffffff) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x4) [ 806.091438] audit: type=1326 audit(1529729058.090:1474): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18550 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:18 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000200), 0x8) 04:44:18 executing program 5: socket$inet6(0xa, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000040)) 04:44:18 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) semget(0xffffffffffffffff, 0x0, 0x0) [ 806.196750] audit: type=1326 audit(1529729058.192:1475): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18555 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x20000505a5}]}) semctl$IPC_INFO(0x0, 0x0, 0x3, &(0x7f0000000280)=""/177) 04:44:18 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) finit_module(0xffffffffffffffff, &(0x7f0000000040)=',cgroupvboxnet1+lobdevposix_acl_access\x00', 0x0) 04:44:18 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000200), 0x8) 04:44:18 executing program 0: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) semget(0xffffffffffffffff, 0x0, 0x0) 04:44:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x20000505a5}]}) semctl$IPC_INFO(0x0, 0x0, 0x3, &(0x7f0000000280)=""/177) 04:44:18 executing program 5: socket$inet6(0xa, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000040)) 04:44:18 executing program 0: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) semget(0xffffffffffffffff, 0x0, 0x0) 04:44:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) accept(0xffffffffffffff9c, &(0x7f0000000140)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) clock_settime(0x0, &(0x7f00000015c0)) 04:44:18 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) finit_module(0xffffffffffffffff, &(0x7f0000000040)=',cgroupvboxnet1+lobdevposix_acl_access\x00', 0x0) 04:44:18 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000200), 0x8) [ 806.869813] audit: type=1326 audit(1529729058.868:1476): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18601 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:19 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'ip6gre0\x00', @ifru_data=&(0x7f0000000000)="2ff00146fbd0aa6bb716c5bbdd4260e89b4d0ff1ce12369fe5e26ec2633948bf"}) 04:44:19 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x20000505a5}]}) semctl$IPC_INFO(0x0, 0x0, 0x3, &(0x7f0000000280)=""/177) [ 807.039522] audit: type=1326 audit(1529729059.038:1477): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18608 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:19 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) dup(0xffffffffffffffff) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x4) 04:44:19 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000040)) 04:44:19 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000200), 0x8) 04:44:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) finit_module(0xffffffffffffffff, &(0x7f0000000040)=',cgroupvboxnet1+lobdevposix_acl_access\x00', 0x0) 04:44:19 executing program 0: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) semget(0xffffffffffffffff, 0x0, 0x0) 04:44:19 executing program 7: socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) semctl$IPC_INFO(0x0, 0x0, 0x3, &(0x7f0000000280)=""/177) [ 807.175085] audit: type=1326 audit(1529729059.172:1478): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18621 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) finit_module(0xffffffffffffffff, &(0x7f0000000040)=',cgroupvboxnet1+lobdevposix_acl_access\x00', 0x0) 04:44:19 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000200), 0x8) 04:44:19 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) semget(0xffffffffffffffff, 0x0, 0x0) 04:44:19 executing program 7: socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) semctl$IPC_INFO(0x0, 0x0, 0x3, &(0x7f0000000280)=""/177) 04:44:19 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000040)) 04:44:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) accept(0xffffffffffffff9c, &(0x7f0000000140)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) clock_settime(0x0, &(0x7f00000015c0)) 04:44:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) finit_module(0xffffffffffffffff, &(0x7f0000000040)=',cgroupvboxnet1+lobdevposix_acl_access\x00', 0x0) 04:44:19 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) semget(0xffffffffffffffff, 0x0, 0x0) [ 807.813759] audit: type=1326 audit(1529729059.812:1479): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18652 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:19 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'ip6gre0\x00', @ifru_data=&(0x7f0000000000)="2ff00146fbd0aa6bb716c5bbdd4260e89b4d0ff1ce12369fe5e26ec2633948bf"}) 04:44:19 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000200), 0x8) [ 808.000868] audit: type=1326 audit(1529729059.999:1480): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18666 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:20 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) dup(0xffffffffffffffff) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x4) 04:44:20 executing program 7: socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) semctl$IPC_INFO(0x0, 0x0, 0x3, &(0x7f0000000280)=""/177) 04:44:20 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000040)) 04:44:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) finit_module(0xffffffffffffffff, &(0x7f0000000040)=',cgroupvboxnet1+lobdevposix_acl_access\x00', 0x0) 04:44:20 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) semget(0xffffffffffffffff, 0x0, 0x0) 04:44:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000200), 0x8) [ 808.098757] audit: type=1326 audit(1529729060.097:1481): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18670 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) semget(0xffffffffffffffff, 0x0, 0x0) 04:44:20 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x20000505a5}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) semctl$IPC_INFO(0x0, 0x0, 0x3, &(0x7f0000000280)=""/177) [ 808.151791] audit: type=1326 audit(1529729060.141:1482): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18681 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) finit_module(0xffffffffffffffff, &(0x7f0000000040)=',cgroupvboxnet1+lobdevposix_acl_access\x00', 0x0) 04:44:20 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) socket$inet6(0xa, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000040)) 04:44:20 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x20000505a5}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) semctl$IPC_INFO(0x0, 0x0, 0x3, &(0x7f0000000280)=""/177) 04:44:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) finit_module(0xffffffffffffffff, &(0x7f0000000040)=',cgroupvboxnet1+lobdevposix_acl_access\x00', 0x0) 04:44:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) semget(0xffffffffffffffff, 0x0, 0x0) 04:44:20 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x20000505a5}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) semctl$IPC_INFO(0x0, 0x0, 0x3, &(0x7f0000000280)=""/177) 04:44:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) semget(0xffffffffffffffff, 0x0, 0x0) 04:44:20 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) socket$inet6(0xa, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000040)) 04:44:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000200), 0x8) 04:44:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, &(0x7f00000005c0)='threaded\x00', 0x9) 04:44:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) finit_module(0xffffffffffffffff, &(0x7f0000000040)=',cgroupvboxnet1+lobdevposix_acl_access\x00', 0x0) 04:44:21 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f00000000c0)}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) semctl$IPC_INFO(0x0, 0x0, 0x3, &(0x7f0000000280)=""/177) 04:44:21 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) 04:44:21 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) semget(0xffffffffffffffff, 0x0, 0x0) 04:44:21 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) socket$inet6(0xa, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000040)) 04:44:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) [ 809.084220] audit: type=1326 audit(1529729061.082:1483): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18729 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 809.106387] audit: type=1326 audit(1529729061.103:1484): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18732 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:21 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f00000000c0)}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) semctl$IPC_INFO(0x0, 0x0, 0x3, &(0x7f0000000280)=""/177) 04:44:21 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) semget(0xffffffffffffffff, 0x0, 0x0) 04:44:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) 04:44:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, &(0x7f00000005c0)='threaded\x00', 0x9) 04:44:21 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000040)) 04:44:21 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpu.stat\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 04:44:21 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) semget(0xffffffffffffffff, 0x0, 0x0) 04:44:21 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f00000000c0)}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) semctl$IPC_INFO(0x0, 0x0, 0x3, &(0x7f0000000280)=""/177) 04:44:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) 04:44:22 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000040)) 04:44:22 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) semget(0xffffffffffffffff, 0x0, 0x0) 04:44:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, &(0x7f00000005c0)='threaded\x00', 0x9) 04:44:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000200), 0x8) 04:44:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) finit_module(0xffffffffffffffff, &(0x7f0000000040)=',cgroupvboxnet1+lobdevposix_acl_access\x00', 0x0) 04:44:22 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x20000505a5}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) semctl$IPC_INFO(0x0, 0x0, 0x3, &(0x7f0000000280)=""/177) 04:44:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpu.stat\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 810.083912] audit: type=1326 audit(1529729062.082:1485): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18790 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 810.103720] audit: type=1326 audit(1529729062.082:1486): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18796 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:22 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x20000505a5}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) semctl$IPC_INFO(0x0, 0x0, 0x3, &(0x7f0000000280)=""/177) 04:44:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) 04:44:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, &(0x7f00000005c0)='threaded\x00', 0x9) [ 810.233713] audit: type=1326 audit(1529729062.144:1487): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18793 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpu.stat\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 04:44:22 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000040)) 04:44:22 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x20000505a5}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) semctl$IPC_INFO(0x0, 0x0, 0x3, &(0x7f0000000280)=""/177) 04:44:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) 04:44:22 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000040)) 04:44:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpu.stat\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 04:44:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) write$cgroup_type(0xffffffffffffffff, &(0x7f00000005c0)='threaded\x00', 0x9) 04:44:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000000c0)=[{0x6}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) semctl$IPC_INFO(0x0, 0x0, 0x3, &(0x7f0000000280)=""/177) 04:44:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) 04:44:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) finit_module(0xffffffffffffffff, &(0x7f0000000040)=',cgroupvboxnet1+lobdevposix_acl_access\x00', 0x0) 04:44:23 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) semget(0xffffffffffffffff, 0x0, 0x0) 04:44:23 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50192}]}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'dummy0\x00'}) 04:44:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) faccessat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 04:44:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) write$cgroup_type(0xffffffffffffffff, &(0x7f00000005c0)='threaded\x00', 0x9) 04:44:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) 04:44:23 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50192}]}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'dummy0\x00'}) 04:44:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) faccessat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 04:44:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) write$cgroup_type(0xffffffffffffffff, &(0x7f00000005c0)='threaded\x00', 0x9) 04:44:23 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) 04:44:23 executing program 1: socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, &(0x7f00000005c0)='threaded\x00', 0x9) 04:44:23 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000040)) 04:44:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) faccessat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 04:44:23 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50192}]}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'dummy0\x00'}) 04:44:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000000c0)=[{0x6}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) semctl$IPC_INFO(0x0, 0x0, 0x3, &(0x7f0000000280)=""/177) 04:44:23 executing program 1: socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, &(0x7f00000005c0)='threaded\x00', 0x9) 04:44:23 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) 04:44:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) semget(0xffffffffffffffff, 0x0, 0x0) 04:44:24 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpu.stat\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 04:44:24 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50192}]}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'dummy0\x00'}) 04:44:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') memfd_create(&(0x7f0000000100)='net/fib_triestat\x00', 0x0) 04:44:24 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) 04:44:24 executing program 1: socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, &(0x7f00000005c0)='threaded\x00', 0x9) 04:44:24 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpu.stat\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 04:44:24 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50192}]}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'dummy0\x00'}) 04:44:24 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) 04:44:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') memfd_create(&(0x7f0000000100)='net/fib_triestat\x00', 0x0) 04:44:24 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000040)) 04:44:24 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, &(0x7f00000005c0)='threaded\x00', 0x9) 04:44:24 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpu.stat\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 812.584550] kauditd_printk_skb: 7 callbacks suppressed [ 812.584571] audit: type=1326 audit(1529729064.583:1495): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18941 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000000c0)=[{0x6}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) semctl$IPC_INFO(0x0, 0x0, 0x3, &(0x7f0000000280)=""/177) 04:44:24 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) 04:44:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') memfd_create(&(0x7f0000000100)='net/fib_triestat\x00', 0x0) 04:44:25 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) 04:44:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50192}]}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'dummy0\x00'}) 04:44:25 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, &(0x7f00000005c0)='threaded\x00', 0x9) 04:44:25 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpu.stat\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 04:44:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) fchownat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) [ 812.970819] audit: type=1326 audit(1529729064.969:1496): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18954 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') memfd_create(&(0x7f0000000100)='net/fib_triestat\x00', 0x0) 04:44:25 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpu.stat\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 04:44:25 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, &(0x7f00000005c0)='threaded\x00', 0x9) 04:44:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) 04:44:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50192}]}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'dummy0\x00'}) 04:44:25 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'dummy0\x00'}) 04:44:25 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpu.stat\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 04:44:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) fchownat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) 04:44:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) fchownat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) 04:44:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) 04:44:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, &(0x7f00000005c0)='threaded\x00', 0x9) 04:44:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) memfd_create(&(0x7f0000000100)='net/fib_triestat\x00', 0x0) 04:44:25 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'dummy0\x00'}) 04:44:25 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpu.stat\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 04:44:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) 04:44:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000200)) timer_gettime(0x0, &(0x7f0000000280)) 04:44:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, &(0x7f00000005c0)='threaded\x00', 0x9) 04:44:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpu.stat\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 04:44:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) memfd_create(&(0x7f0000000100)='net/fib_triestat\x00', 0x0) 04:44:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) 04:44:26 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) fchownat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) 04:44:26 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'dummy0\x00'}) 04:44:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) 04:44:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, &(0x7f00000005c0)='threaded\x00', 0x9) 04:44:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000200)) timer_gettime(0x0, &(0x7f0000000280)) 04:44:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpu.stat\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 04:44:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) 04:44:26 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50192}]}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'dummy0\x00'}) 04:44:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) memfd_create(&(0x7f0000000100)='net/fib_triestat\x00', 0x0) 04:44:26 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) fchownat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) 04:44:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, &(0x7f00000005c0)='threaded\x00', 0x9) 04:44:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) 04:44:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpu.stat\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 04:44:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000200)) timer_gettime(0x0, &(0x7f0000000280)) 04:44:26 executing program 2: syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') memfd_create(&(0x7f0000000100)='net/fib_triestat\x00', 0x0) 04:44:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) 04:44:26 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50192}]}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'dummy0\x00'}) 04:44:26 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) fchownat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) 04:44:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, &(0x7f00000005c0)='threaded\x00', 0x9) 04:44:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) 04:44:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpu.stat\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 04:44:26 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50192}]}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'dummy0\x00'}) 04:44:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000200)) timer_gettime(0x0, &(0x7f0000000280)) 04:44:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) 04:44:26 executing program 2: syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') memfd_create(&(0x7f0000000100)='net/fib_triestat\x00', 0x0) 04:44:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, &(0x7f00000005c0)='threaded\x00', 0x9) 04:44:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) fchownat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) 04:44:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'dummy0\x00'}) 04:44:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpu.stat\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 04:44:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) 04:44:27 executing program 2: syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') memfd_create(&(0x7f0000000100)='net/fib_triestat\x00', 0x0) 04:44:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) 04:44:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) timer_gettime(0x0, &(0x7f0000000280)) [ 815.261480] audit: type=1326 audit(1529729067.260:1497): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19123 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, &(0x7f00000005c0)='threaded\x00', 0x9) 04:44:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'dummy0\x00'}) 04:44:27 executing program 0: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) fchownat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) 04:44:27 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') memfd_create(&(0x7f0000000100)='net/fib_triestat\x00', 0x0) 04:44:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpu.stat\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 815.424355] audit: type=1326 audit(1529729067.423:1498): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19134 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) 04:44:27 executing program 0: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) fchownat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) 04:44:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) timer_gettime(0x0, &(0x7f0000000280)) [ 815.519666] audit: type=1326 audit(1529729067.510:1499): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19143 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'dummy0\x00'}) 04:44:27 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') memfd_create(&(0x7f0000000100)='net/fib_triestat\x00', 0x0) 04:44:27 executing program 0: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) fchownat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) 04:44:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) 04:44:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) 04:44:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) timer_gettime(0x0, &(0x7f0000000280)) 04:44:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50192}]}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'dummy0\x00'}) 04:44:28 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') memfd_create(&(0x7f0000000100)='net/fib_triestat\x00', 0x0) [ 816.188818] audit: type=1326 audit(1529729068.187:1500): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19180 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:28 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) 04:44:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, &(0x7f00000005c0)='threaded\x00', 0x9) 04:44:28 executing program 7: socketpair(0x0, 0x0, 0x0, &(0x7f0000000200)) timer_gettime(0x0, &(0x7f0000000280)) 04:44:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') memfd_create(&(0x7f0000000100)='net/fib_triestat\x00', 0x0) [ 816.364773] audit: type=1326 audit(1529729068.361:1501): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19195 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:28 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpu.stat\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 04:44:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50192}]}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'dummy0\x00'}) 04:44:28 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) fchownat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) 04:44:28 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) 04:44:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') memfd_create(&(0x7f0000000100)='net/fib_triestat\x00', 0x0) 04:44:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50192}]}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'dummy0\x00'}) [ 816.520366] audit: type=1326 audit(1529729068.519:1502): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19209 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:28 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) 04:44:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') memfd_create(&(0x7f0000000100)='net/fib_triestat\x00', 0x0) 04:44:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) 04:44:29 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) fchownat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) 04:44:29 executing program 7: socketpair(0x0, 0x0, 0x0, &(0x7f0000000200)) timer_gettime(0x0, &(0x7f0000000280)) 04:44:29 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'dummy0\x00'}) 04:44:29 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) [ 817.138687] audit: type=1326 audit(1529729069.137:1504): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19231 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 817.191269] audit: type=1326 audit(1529729069.135:1503): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19226 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:29 executing program 7: socketpair(0x0, 0x0, 0x0, &(0x7f0000000200)) timer_gettime(0x0, &(0x7f0000000280)) 04:44:29 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') memfd_create(&(0x7f0000000100)='net/fib_triestat\x00', 0x0) 04:44:29 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) 04:44:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpu.stat\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 04:44:29 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) fchownat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) 04:44:29 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') memfd_create(&(0x7f0000000100)='net/fib_triestat\x00', 0x0) 04:44:29 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) 04:44:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000300)) write$cgroup_type(0xffffffffffffffff, &(0x7f00000005c0)='threaded\x00', 0x9) 04:44:29 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') memfd_create(&(0x7f0000000100)='net/fib_triestat\x00', 0x0) 04:44:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) fchownat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) 04:44:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) 04:44:30 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) fchownat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) 04:44:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) 04:44:30 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') memfd_create(&(0x7f0000000100)='net/fib_triestat\x00', 0x0) 04:44:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'dummy0\x00'}) 04:44:30 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000200)) timer_gettime(0x0, &(0x7f0000000280)) 04:44:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) [ 818.075220] kauditd_printk_skb: 2 callbacks suppressed [ 818.075244] audit: type=1326 audit(1529729070.073:1507): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19278 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:30 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) fchownat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) [ 818.201809] audit: type=1326 audit(1529729070.169:1508): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19289 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) 04:44:30 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000200)) timer_gettime(0x0, &(0x7f0000000280)) 04:44:30 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) fchownat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) 04:44:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) 04:44:30 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) fchownat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) 04:44:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) 04:44:30 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000200)) timer_gettime(0x0, &(0x7f0000000280)) 04:44:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) 04:44:30 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) fchownat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) 04:44:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000200)) timer_gettime(0x0, &(0x7f0000000280)) 04:44:30 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) fchownat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) [ 818.688109] audit: type=1326 audit(1529729070.686:1509): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19325 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 818.750790] audit: type=1326 audit(1529729070.749:1510): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19332 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:30 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') memfd_create(&(0x7f0000000100)='net/fib_triestat\x00', 0x0) [ 819.010522] audit: type=1326 audit(1529729071.009:1511): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19339 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'dummy0\x00'}) 04:44:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000200)) timer_gettime(0x0, &(0x7f0000000280)) 04:44:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) dup(0xffffffffffffff9c) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:44:31 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 04:44:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x20000505a5}]}) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) nanosleep(&(0x7f0000000400), &(0x7f0000000440)) [ 819.129306] audit: type=1326 audit(1529729071.127:1512): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19347 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000200)) timer_gettime(0x0, &(0x7f0000000280)) 04:44:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) dup(0xffffffffffffff9c) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:44:31 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 04:44:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x20000505a5}]}) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) nanosleep(&(0x7f0000000400), &(0x7f0000000440)) 04:44:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000200)) timer_gettime(0x0, &(0x7f0000000280)) 04:44:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) dup(0xffffffffffffff9c) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:44:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) 04:44:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x20000505a5}]}) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) nanosleep(&(0x7f0000000400), &(0x7f0000000440)) 04:44:31 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 04:44:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000200)) timer_gettime(0x0, &(0x7f0000000280)) [ 819.673974] audit: type=1326 audit(1529729071.672:1513): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19384 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:31 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) fchownat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) [ 819.940383] audit: type=1326 audit(1529729071.939:1514): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19397 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') memfd_create(&(0x7f0000000100)='net/fib_triestat\x00', 0x0) 04:44:32 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 04:44:32 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000200)) timer_gettime(0x0, &(0x7f0000000280)) 04:44:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x20000505a5}]}) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) nanosleep(&(0x7f0000000400), &(0x7f0000000440)) 04:44:32 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) dup(0xffffffffffffff9c) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:44:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') getpeername$netlink(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0xc) [ 820.090517] audit: type=1326 audit(1529729072.089:1515): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19405 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:32 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000200)) timer_gettime(0x0, &(0x7f0000000280)) 04:44:32 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 04:44:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x20000505a5}]}) nanosleep(&(0x7f0000000400), &(0x7f0000000440)) 04:44:32 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:44:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') getpeername$netlink(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0xc) [ 820.336166] audit: type=1326 audit(1529729072.334:1516): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19418 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) 04:44:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x20000505a5}]}) nanosleep(&(0x7f0000000400), &(0x7f0000000440)) 04:44:32 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:44:32 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 04:44:32 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) fchownat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) 04:44:33 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 04:44:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') getpeername$netlink(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0xc) 04:44:33 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:44:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x20000505a5}]}) nanosleep(&(0x7f0000000400), &(0x7f0000000440)) 04:44:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) pipe2(&(0x7f00000000c0), 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) 04:44:33 executing program 6: openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 04:44:33 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000200)) timer_gettime(0x0, &(0x7f0000000280)) 04:44:33 executing program 1: open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) nanosleep(&(0x7f0000000400), &(0x7f0000000440)) 04:44:33 executing program 3: dup(0xffffffffffffff9c) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:44:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') getpeername$netlink(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0xc) 04:44:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) pipe2(&(0x7f00000000c0), 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) 04:44:33 executing program 3: dup(0xffffffffffffff9c) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:44:33 executing program 6: openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 04:44:33 executing program 1: open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) nanosleep(&(0x7f0000000400), &(0x7f0000000440)) 04:44:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0xc) 04:44:33 executing program 6: openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 04:44:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) pipe2(&(0x7f00000000c0), 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) 04:44:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0xc) 04:44:33 executing program 3: dup(0xffffffffffffff9c) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:44:33 executing program 1: open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) nanosleep(&(0x7f0000000400), &(0x7f0000000440)) 04:44:33 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) 04:44:33 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x20000505a5}]}) getsockname(0xffffffffffffff9c, &(0x7f0000000180)=@pppol2tpv3, &(0x7f0000000000)=0xfeea) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000540)) 04:44:34 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 04:44:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000200)) timer_gettime(0x0, &(0x7f0000000280)) 04:44:34 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0xc) 04:44:34 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) dup(0xffffffffffffff9c) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:44:34 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) pipe2(&(0x7f00000000c0), 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) 04:44:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) 04:44:34 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x20000505a5}]}) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) nanosleep(&(0x7f0000000400), &(0x7f0000000440)) 04:44:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x20000505a5}]}) getsockname(0xffffffffffffff9c, &(0x7f0000000180)=@pppol2tpv3, &(0x7f0000000000)=0xfeea) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000540)) 04:44:34 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 04:44:34 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x20000505a5}]}) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) nanosleep(&(0x7f0000000400), &(0x7f0000000440)) 04:44:34 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) dup(0xffffffffffffff9c) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:44:34 executing program 4: syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') getpeername$netlink(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0xc) 04:44:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) 04:44:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x20000505a5}]}) getsockname(0xffffffffffffff9c, &(0x7f0000000180)=@pppol2tpv3, &(0x7f0000000000)=0xfeea) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000540)) 04:44:34 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) 04:44:34 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 04:44:34 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x20000505a5}]}) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) nanosleep(&(0x7f0000000400), &(0x7f0000000440)) 04:44:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f00000000c0)}) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) nanosleep(&(0x7f0000000400), &(0x7f0000000440)) 04:44:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) 04:44:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x20000505a5}]}) getsockname(0xffffffffffffff9c, &(0x7f0000000180)=@pppol2tpv3, &(0x7f0000000000)=0xfeea) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000540)) 04:44:35 executing program 4: syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') getpeername$netlink(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0xc) 04:44:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) 04:44:35 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) dup(0xffffffffffffff9c) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:44:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 04:44:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00'}, 0x10) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000180), 0x8) 04:44:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) dup(0xffffffffffffff9c) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:44:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 04:44:35 executing program 4: syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') getpeername$netlink(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0xc) 04:44:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f00000000c0)}) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) nanosleep(&(0x7f0000000400), &(0x7f0000000440)) 04:44:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) 04:44:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x20000505a5}]}) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000540)) 04:44:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) 04:44:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) dup(0xffffffffffffff9c) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:44:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00'}, 0x10) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000180), 0x8) 04:44:35 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') getpeername$netlink(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0xc) 04:44:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 04:44:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f00000000c0)}) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) nanosleep(&(0x7f0000000400), &(0x7f0000000440)) 04:44:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x20000505a5}]}) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000540)) 04:44:35 executing program 2: pipe2(&(0x7f00000000c0), 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) 04:44:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) 04:44:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) dup(0xffffffffffffff9c) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:44:35 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') getpeername$netlink(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0xc) 04:44:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 04:44:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00'}, 0x10) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000180), 0x8) 04:44:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x20000505a5}]}) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) nanosleep(&(0x7f0000000400), &(0x7f0000000440)) 04:44:36 executing program 2: pipe2(&(0x7f00000000c0), 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) 04:44:36 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x20000505a5}]}) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000540)) 04:44:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]}) dup(0xffffffffffffff9c) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:44:36 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') getpeername$netlink(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0xc) 04:44:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) 04:44:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 04:44:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x20000505a5}]}) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) nanosleep(&(0x7f0000000400), &(0x7f0000000440)) 04:44:36 executing program 2: pipe2(&(0x7f00000000c0), 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) 04:44:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00'}, 0x10) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000180), 0x8) 04:44:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]}) dup(0xffffffffffffff9c) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:44:36 executing program 0: getsockname(0xffffffffffffff9c, &(0x7f0000000180)=@pppol2tpv3, &(0x7f0000000000)=0xfeea) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000540)) 04:44:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') getpeername$netlink(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0xc) 04:44:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 04:44:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x20000505a5}]}) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) nanosleep(&(0x7f0000000400), &(0x7f0000000440)) 04:44:36 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) pipe2(&(0x7f00000000c0), 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) 04:44:36 executing program 5: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) 04:44:36 executing program 0: getsockname(0xffffffffffffff9c, &(0x7f0000000180)=@pppol2tpv3, &(0x7f0000000000)=0xfeea) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000540)) 04:44:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) prctl$setptracer(0x59616d61, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'vcan0\x00', @ifru_flags}) 04:44:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]}) dup(0xffffffffffffff9c) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:44:36 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) pipe2(&(0x7f00000000c0), 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) 04:44:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000000c0)=[{0x6}]}) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) nanosleep(&(0x7f0000000400), &(0x7f0000000440)) 04:44:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 04:44:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') getpeername$netlink(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0xc) 04:44:36 executing program 0: getsockname(0xffffffffffffff9c, &(0x7f0000000180)=@pppol2tpv3, &(0x7f0000000000)=0xfeea) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000540)) 04:44:36 executing program 5: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) [ 824.798095] kauditd_printk_skb: 4 callbacks suppressed [ 824.798119] audit: type=1326 audit(1529729076.796:1521): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19722 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:36 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) pipe2(&(0x7f00000000c0), 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) 04:44:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000140)=""/113, 0x71) 04:44:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) dup(0xffffffffffffff9c) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:44:36 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x20000505a5}]}) getsockname(0xffffffffffffff9c, &(0x7f0000000180)=@pppol2tpv3, &(0x7f0000000000)=0xfeea) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000540)) 04:44:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') getpeername$netlink(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0xc) [ 824.949254] audit: type=1326 audit(1529729076.838:1522): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19720 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:37 executing program 5: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) [ 825.077790] audit: type=1326 audit(1529729077.039:1523): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19743 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f00000000c0), 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) 04:44:37 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x20000505a5}]}) getsockname(0xffffffffffffff9c, &(0x7f0000000180)=@pppol2tpv3, &(0x7f0000000000)=0xfeea) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000540)) 04:44:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') getpeername$netlink(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0xc) 04:44:37 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) 04:44:37 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]}) ustat(0x0, &(0x7f00000000c0)) keyctl$unlink(0x9, 0x0, 0x0) 04:44:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f00000000c0), 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) 04:44:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 04:44:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') getpeername$netlink(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0xc) 04:44:37 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) 04:44:37 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]}) ustat(0x0, &(0x7f00000000c0)) keyctl$unlink(0x9, 0x0, 0x0) 04:44:37 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x20000505a5}]}) getsockname(0xffffffffffffff9c, &(0x7f0000000180)=@pppol2tpv3, &(0x7f0000000000)=0xfeea) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000540)) 04:44:37 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000000c0)=[{0x6}]}) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) nanosleep(&(0x7f0000000400), &(0x7f0000000440)) [ 825.773498] audit: type=1326 audit(1529729077.772:1524): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19784 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 825.870303] audit: type=1326 audit(1529729077.808:1525): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19788 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:37 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) dup(0xffffffffffffff9c) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:44:37 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f00000000c0)}) getsockname(0xffffffffffffff9c, &(0x7f0000000180)=@pppol2tpv3, &(0x7f0000000000)=0xfeea) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000540)) 04:44:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f00000000c0), 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) 04:44:37 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) 04:44:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') getpeername$netlink(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0xc) 04:44:37 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]}) ustat(0x0, &(0x7f00000000c0)) keyctl$unlink(0x9, 0x0, 0x0) 04:44:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]}) pipe2(&(0x7f00000000c0), 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) 04:44:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) [ 826.081621] audit: type=1326 audit(1529729078.080:1526): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19807 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f00000000c0)}) getsockname(0xffffffffffffff9c, &(0x7f0000000180)=@pppol2tpv3, &(0x7f0000000000)=0xfeea) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000540)) 04:44:38 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') getpeername$netlink(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0xc) [ 826.248501] audit: type=1326 audit(1529729078.247:1527): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19819 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000000c0)=[{0x6}]}) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) nanosleep(&(0x7f0000000400), &(0x7f0000000440)) 04:44:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]}) ustat(0x0, &(0x7f00000000c0)) keyctl$unlink(0x9, 0x0, 0x0) 04:44:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]}) pipe2(&(0x7f00000000c0), 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) 04:44:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) 04:44:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f00000000c0)}) getsockname(0xffffffffffffff9c, &(0x7f0000000180)=@pppol2tpv3, &(0x7f0000000000)=0xfeea) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000540)) 04:44:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) [ 826.748092] audit: type=1326 audit(1529729078.746:1528): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19829 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 826.793985] audit: type=1326 audit(1529729078.769:1529): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19833 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x20000505a5}]}) getsockname(0xffffffffffffff9c, &(0x7f0000000180)=@pppol2tpv3, &(0x7f0000000000)=0xfeea) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000540)) 04:44:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) dup(0xffffffffffffff9c) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:44:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) 04:44:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]}) pipe2(&(0x7f00000000c0), 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) 04:44:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]}) keyctl$unlink(0x9, 0x0, 0x0) [ 827.012552] audit: type=1326 audit(1529729079.010:1530): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19854 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]}) keyctl$unlink(0x9, 0x0, 0x0) 04:44:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) 04:44:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x20000505a5}]}) getsockname(0xffffffffffffff9c, &(0x7f0000000180)=@pppol2tpv3, &(0x7f0000000000)=0xfeea) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000540)) 04:44:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f00000000c0), 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) 04:44:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') getpeername$netlink(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0xc) 04:44:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x20000505a5}]}) getsockname(0xffffffffffffff9c, &(0x7f0000000180)=@pppol2tpv3, &(0x7f0000000000)=0xfeea) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000540)) 04:44:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) 04:44:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]}) keyctl$unlink(0x9, 0x0, 0x0) 04:44:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) 04:44:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') sysfs$3(0x3) 04:44:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000000c0)=[{0x6}]}) getsockname(0xffffffffffffff9c, &(0x7f0000000180)=@pppol2tpv3, &(0x7f0000000000)=0xfeea) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000540)) 04:44:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') flistxattr(0xffffffffffffffff, &(0x7f0000000100)=""/140, 0x8c) 04:44:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') sysfs$3(0x3) 04:44:39 executing program 7: ustat(0x0, &(0x7f00000000c0)) keyctl$unlink(0x9, 0x0, 0x0) 04:44:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) 04:44:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x0, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000100)={0x10}, 0xc) 04:44:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') flistxattr(0xffffffffffffffff, &(0x7f0000000100)=""/140, 0x8c) 04:44:40 executing program 7: ustat(0x0, &(0x7f00000000c0)) keyctl$unlink(0x9, 0x0, 0x0) 04:44:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f00000000c0), 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) 04:44:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') sysfs$3(0x3) 04:44:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') getpeername$netlink(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0xc) 04:44:40 executing program 7: ustat(0x0, &(0x7f00000000c0)) keyctl$unlink(0x9, 0x0, 0x0) 04:44:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x0, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000100)={0x10}, 0xc) 04:44:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') flistxattr(0xffffffffffffffff, &(0x7f0000000100)=""/140, 0x8c) 04:44:40 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]}) ustat(0x0, &(0x7f00000000c0)) keyctl$unlink(0x9, 0x0, 0x0) 04:44:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') sysfs$3(0x3) 04:44:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x0, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000100)={0x10}, 0xc) 04:44:40 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000000c0)=[{0x6}]}) getsockname(0xffffffffffffff9c, &(0x7f0000000180)=@pppol2tpv3, &(0x7f0000000000)=0xfeea) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000540)) 04:44:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') flistxattr(0xffffffffffffffff, &(0x7f0000000100)=""/140, 0x8c) 04:44:40 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]}) ustat(0x0, &(0x7f00000000c0)) keyctl$unlink(0x9, 0x0, 0x0) 04:44:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x0, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000100)={0x10}, 0xc) 04:44:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) sysfs$3(0x3) 04:44:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) flistxattr(0xffffffffffffffff, &(0x7f0000000100)=""/140, 0x8c) 04:44:40 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50351}]}) ustat(0x0, &(0x7f00000000c0)) keyctl$unlink(0x9, 0x0, 0x0) 04:44:41 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) bind$netlink(0xffffffffffffffff, &(0x7f0000000100)={0x10}, 0xc) 04:44:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f00000000c0), 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) 04:44:41 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) bind$netlink(0xffffffffffffffff, &(0x7f0000000100)={0x10}, 0xc) 04:44:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) sysfs$3(0x3) 04:44:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000540)=ANY=[], &(0x7f00000000c0)) 04:44:41 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000300)}) ustat(0x0, &(0x7f00000000c0)) keyctl$unlink(0x9, 0x0, 0x0) 04:44:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) 04:44:41 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) flistxattr(0xffffffffffffffff, &(0x7f0000000100)=""/140, 0x8c) 04:44:41 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000300)}) ustat(0x0, &(0x7f00000000c0)) keyctl$unlink(0x9, 0x0, 0x0) 04:44:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) sysfs$3(0x3) 04:44:41 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) flistxattr(0xffffffffffffffff, &(0x7f0000000100)=""/140, 0x8c) 04:44:41 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) bind$netlink(0xffffffffffffffff, &(0x7f0000000100)={0x10}, 0xc) 04:44:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000540)=ANY=[], &(0x7f00000000c0)) 04:44:41 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000300)}) ustat(0x0, &(0x7f00000000c0)) keyctl$unlink(0x9, 0x0, 0x0) 04:44:41 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000000c0)=[{0x6}]}) getsockname(0xffffffffffffff9c, &(0x7f0000000180)=@pppol2tpv3, &(0x7f0000000000)=0xfeea) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000540)) [ 829.737993] syz-executor4: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 829.748529] syz-executor4 cpuset=syz4 mems_allowed=0 [ 829.753632] CPU: 1 PID: 20008 Comm: syz-executor4 Not tainted 4.17.0+ #9 [ 829.760452] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 829.769788] Call Trace: [ 829.772363] dump_stack+0x185/0x1d0 [ 829.775976] warn_alloc+0x430/0x690 [ 829.779595] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 829.784422] ? kernel_poison_pages+0x40/0x360 [ 829.788900] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 829.794330] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 829.799255] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 829.804266] kmsan_alloc_page+0x82/0xe0 [ 829.808232] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 829.812970] ? kmsan_set_origin_inline+0x6b/0x120 [ 829.817798] ? __msan_poison_alloca+0x15c/0x1d0 [ 829.822449] ? __should_failslab+0x278/0x2a0 [ 829.826843] ? should_fail+0x57/0xab0 [ 829.830622] ? __should_failslab+0x278/0x2a0 [ 829.835016] ? kmsan_set_origin_inline+0x6b/0x120 [ 829.839842] ? __msan_poison_alloca+0x15c/0x1d0 [ 829.844495] ? kmsan_set_origin+0x9e/0x160 [ 829.848718] alloc_pages_vma+0x1555/0x17f0 [ 829.852941] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 829.858032] handle_mm_fault+0x44ca/0x7ed0 [ 829.862249] ? kmsan_set_origin_inline+0x6b/0x120 [ 829.867080] __do_page_fault+0xec6/0x1a10 [ 829.871216] do_page_fault+0xb7/0x250 [ 829.875006] ? page_fault+0x8/0x30 [ 829.878531] page_fault+0x1e/0x30 [ 829.881962] RIP: 0033:0x4075fa [ 829.885132] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 829.890473] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 0000000000000001 [ 829.897813] RDX: 14d60f947034fa23 RSI: 0000000000000000 RDI: 0000000001898848 [ 829.905065] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 829.912314] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000cac49 [ 829.919574] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 829.926847] warn_alloc_show_mem: 1 callbacks suppressed [ 829.926850] Mem-Info: [ 829.934587] active_anon:167021 inactive_anon:76 isolated_anon:0 [ 829.934587] active_file:1363 inactive_file:949 isolated_file:0 [ 829.934587] unevictable:0 dirty:21 writeback:0 unstable:0 [ 829.934587] slab_reclaimable:3486 slab_unreclaimable:10217 [ 829.934587] mapped:67213 shmem:84 pagetables:1464 bounce:0 [ 829.934587] free:57509 free_pcp:392 free_cma:0 [ 829.967650] Node 0 active_anon:668084kB inactive_anon:304kB active_file:5452kB inactive_file:3796kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:268852kB dirty:84kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 274432kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 829.995474] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 830.021583] lowmem_reserve[]: 0 2817 7244 7244 [ 830.026155] Node 0 DMA32 free:162720kB min:26224kB low:32780kB high:39336kB active_anon:217096kB inactive_anon:32kB active_file:2128kB inactive_file:3516kB unevictable:0kB writepending:80kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2816kB pagetables:2896kB bounce:0kB free_pcp:96kB local_pcp:32kB free_cma:0kB [ 830.055215] lowmem_reserve[]: 0 0 4426 4426 [ 830.059521] Node 0 Normal free:51412kB min:41208kB low:51508kB high:61808kB active_anon:450972kB inactive_anon:272kB active_file:3324kB inactive_file:280kB unevictable:0kB writepending:4kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7232kB pagetables:2960kB bounce:0kB free_pcp:1472kB local_pcp:728kB free_cma:0kB [ 830.088750] lowmem_reserve[]: 0 0 0 0 [ 830.092534] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 830.105736] Node 0 DMA32: 2588*4kB (MEH) 5538*8kB (UME) 1682*16kB (ME) 754*32kB (ME) 357*64kB (ME) 147*128kB (UME) 40*256kB (ME) 10*512kB (UM) 0*1024kB 0*2048kB 0*4096kB = 162720kB [ 830.121987] Node 0 Normal: 8681*4kB (UME) 1906*8kB (UM) 80*16kB (UM) 1*32kB (U) 2*64kB (U) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 51412kB [ 830.135718] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 830.144269] 2398 total pagecache pages [ 830.148131] 0 pages in swap cache [ 830.151559] Swap cache stats: add 0, delete 0, find 0/0 [ 830.156898] Free swap = 0kB [ 830.159892] Total swap = 0kB [ 830.162895] 1965969 pages RAM [ 830.165975] 0 pages HighMem/MovableOnly [ 830.169925] 106316 pages reserved 04:44:42 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x50351}]}) ustat(0x0, &(0x7f00000000c0)) keyctl$unlink(0x9, 0x0, 0x0) 04:44:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) process_vm_writev(0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0), 0x0, 0x0) 04:44:42 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x50351}]}) ustat(0x0, &(0x7f00000000c0)) keyctl$unlink(0x9, 0x0, 0x0) 04:44:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) [ 830.327095] kauditd_printk_skb: 9 callbacks suppressed [ 830.327118] audit: type=1326 audit(1529729082.322:1540): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20015 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:42 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') flistxattr(0xffffffffffffffff, &(0x7f0000000100)=""/140, 0x8c) 04:44:42 executing program 3: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x0, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000100)={0x10}, 0xc) 04:44:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) process_vm_writev(0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0), 0x0, 0x0) 04:44:42 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x50351}]}) ustat(0x0, &(0x7f00000000c0)) keyctl$unlink(0x9, 0x0, 0x0) [ 830.483782] audit: type=1326 audit(1529729082.402:1541): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20029 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:42 executing program 6: syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') sysfs$3(0x3) 04:44:42 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') flistxattr(0xffffffffffffffff, &(0x7f0000000100)=""/140, 0x8c) 04:44:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000540)=ANY=[], &(0x7f00000000c0)) 04:44:42 executing program 6: syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') sysfs$3(0x3) 04:44:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) process_vm_writev(0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0), 0x0, 0x0) 04:44:42 executing program 3: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x0, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000100)={0x10}, 0xc) 04:44:42 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6}]}) ustat(0x0, &(0x7f00000000c0)) keyctl$unlink(0x9, 0x0, 0x0) [ 830.846721] audit: type=1326 audit(1529729082.845:1542): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20059 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000540)=ANY=[], &(0x7f00000000c0)) 04:44:43 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') flistxattr(0xffffffffffffffff, &(0x7f0000000100)=""/140, 0x8c) 04:44:43 executing program 3: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x0, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000100)={0x10}, 0xc) 04:44:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) process_vm_writev(0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0), 0x0, 0x0) 04:44:43 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x0, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000100)={0x10}, 0xc) 04:44:43 executing program 6: syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') sysfs$3(0x3) 04:44:43 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') flistxattr(0xffffffffffffffff, &(0x7f0000000100)=""/140, 0x8c) 04:44:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) process_vm_writev(0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0), 0x0, 0x0) 04:44:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000540)=ANY=[], &(0x7f00000000c0)) 04:44:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180)=""/227, &(0x7f0000000280)=0xe3) 04:44:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) 04:44:43 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x0, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000100)={0x10}, 0xc) 04:44:43 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') sysfs$3(0x3) 04:44:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000540)=ANY=[], &(0x7f00000000c0)) 04:44:43 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') flistxattr(0xffffffffffffffff, &(0x7f0000000100)=""/140, 0x8c) 04:44:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6}]}) ustat(0x0, &(0x7f00000000c0)) keyctl$unlink(0x9, 0x0, 0x0) 04:44:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) process_vm_writev(0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0), 0x0, 0x0) 04:44:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180)=""/227, &(0x7f0000000280)=0xe3) 04:44:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) 04:44:43 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') sysfs$3(0x3) 04:44:43 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') flistxattr(0xffffffffffffffff, &(0x7f0000000100)=""/140, 0x8c) 04:44:43 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x0, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000100)={0x10}, 0xc) 04:44:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000540)=ANY=[], &(0x7f00000000c0)) [ 831.896988] audit: type=1326 audit(1529729083.895:1543): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20136 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180)=""/227, &(0x7f0000000280)=0xe3) 04:44:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) process_vm_writev(0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0), 0x0, 0x0) 04:44:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x0, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000100)={0x10}, 0xc) 04:44:44 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000540)=ANY=[], &(0x7f00000000c0)) 04:44:44 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') sysfs$3(0x3) 04:44:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) 04:44:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') flistxattr(0xffffffffffffffff, &(0x7f0000000100)=""/140, 0x8c) 04:44:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180)=""/227, &(0x7f0000000280)=0xe3) 04:44:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6}]}) ustat(0x0, &(0x7f00000000c0)) keyctl$unlink(0x9, 0x0, 0x0) 04:44:44 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000540)=ANY=[], &(0x7f00000000c0)) 04:44:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') sysfs$3(0x3) 04:44:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x0, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000100)={0x10}, 0xc) 04:44:44 executing program 2: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) process_vm_writev(0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0), 0x0, 0x0) 04:44:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) 04:44:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') flistxattr(0xffffffffffffffff, &(0x7f0000000100)=""/140, 0x8c) 04:44:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180)=""/227, &(0x7f0000000280)=0xe3) [ 832.857517] audit: type=1326 audit(1529729084.856:1544): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20175 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:44 executing program 2: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) process_vm_writev(0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0), 0x0, 0x0) 04:44:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') sysfs$3(0x3) 04:44:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x0, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000100)={0x10}, 0xc) 04:44:44 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000540)=ANY=[], &(0x7f00000000c0)) 04:44:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') flistxattr(0xffffffffffffffff, &(0x7f0000000100)=""/140, 0x8c) 04:44:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180)=""/227, &(0x7f0000000280)=0xe3) 04:44:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) 04:44:45 executing program 2: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) process_vm_writev(0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0), 0x0, 0x0) 04:44:45 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') flistxattr(0xffffffffffffffff, &(0x7f0000000100)=""/140, 0x8c) 04:44:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') sysfs$3(0x3) 04:44:45 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000540)=ANY=[], &(0x7f00000000c0)) 04:44:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180)=""/227, &(0x7f0000000280)=0xe3) 04:44:45 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) process_vm_writev(0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0), 0x0, 0x0) 04:44:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) 04:44:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x0, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000100)={0x10}, 0xc) 04:44:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000300)) ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, &(0x7f0000000080)) 04:44:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x0, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000100)={0x10}, 0xc) 04:44:45 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000540)=ANY=[], &(0x7f00000000c0)) 04:44:45 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) process_vm_writev(0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0), 0x0, 0x0) 04:44:45 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') flistxattr(0xffffffffffffffff, &(0x7f0000000100)=""/140, 0x8c) 04:44:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') sysfs$3(0x3) 04:44:45 executing program 0: socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180)=""/227, &(0x7f0000000280)=0xe3) 04:44:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) 04:44:46 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x0, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000100)={0x10}, 0xc) 04:44:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000300)) ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, &(0x7f0000000080)) 04:44:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') flistxattr(0xffffffffffffffff, &(0x7f0000000100)=""/140, 0x8c) 04:44:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') sysfs$3(0x3) 04:44:46 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) process_vm_writev(0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0), 0x0, 0x0) 04:44:46 executing program 0: socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180)=""/227, &(0x7f0000000280)=0xe3) 04:44:46 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000540)=ANY=[], &(0x7f00000000c0)) 04:44:46 executing program 5: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) 04:44:46 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x0, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000100)={0x10}, 0xc) 04:44:46 executing program 0: socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180)=""/227, &(0x7f0000000280)=0xe3) 04:44:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') sysfs$3(0x3) 04:44:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') flistxattr(0xffffffffffffffff, &(0x7f0000000100)=""/140, 0x8c) 04:44:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000300)) ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, &(0x7f0000000080)) 04:44:46 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)}) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000540)=ANY=[], &(0x7f00000000c0)) 04:44:46 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) process_vm_writev(0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0), 0x0, 0x0) 04:44:46 executing program 5: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) [ 834.495327] audit: type=1326 audit(1529729086.494:1545): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20290 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 834.570395] audit: type=1326 audit(1529729086.568:1546): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20295 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:46 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)}) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000540)=ANY=[], &(0x7f00000000c0)) 04:44:46 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) process_vm_writev(0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0), 0x0, 0x0) 04:44:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') sysfs$3(0x3) 04:44:46 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180)=""/227, &(0x7f0000000280)=0xe3) 04:44:46 executing program 5: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) [ 834.727408] audit: type=1326 audit(1529729086.726:1547): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20316 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:46 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) process_vm_writev(0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0), 0x0, 0x0) 04:44:46 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)}) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000540)=ANY=[], &(0x7f00000000c0)) 04:44:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000300)) ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, &(0x7f0000000080)) 04:44:47 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x0, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000100)={0x10}, 0xc) 04:44:47 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180)=""/227, &(0x7f0000000280)=0xe3) 04:44:47 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) 04:44:47 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') flistxattr(0xffffffffffffffff, &(0x7f0000000100)=""/140, 0x8c) 04:44:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) process_vm_writev(0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0), 0x0, 0x0) 04:44:47 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022d}]}) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000540)=ANY=[], &(0x7f00000000c0)) 04:44:47 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, &(0x7f0000000080)) 04:44:47 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180)=""/227, &(0x7f0000000280)=0xe3) [ 835.414599] audit: type=1326 audit(1529729087.413:1548): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20344 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:47 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) 04:44:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180)=""/227, &(0x7f0000000280)=0xe3) [ 835.562487] audit: type=1326 audit(1529729087.561:1549): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20358 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:47 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') sysfs$3(0x3) 04:44:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) process_vm_writev(0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0), 0x0, 0x0) 04:44:47 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022d}]}) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000540)=ANY=[], &(0x7f00000000c0)) 04:44:47 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, &(0x7f0000000080)) 04:44:47 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) [ 835.763292] audit: type=1326 audit(1529729087.762:1550): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20375 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180)=""/227, &(0x7f0000000280)=0xe3) 04:44:48 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, &(0x7f0000000080)) 04:44:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022d}]}) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000540)=ANY=[], &(0x7f00000000c0)) 04:44:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x0, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000100)={0x10}, 0xc) [ 836.378937] audit: type=1326 audit(1529729088.377:1551): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20396 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') flistxattr(0xffffffffffffffff, &(0x7f0000000100)=""/140, 0x8c) 04:44:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) process_vm_writev(0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0), 0x0, 0x0) 04:44:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) 04:44:48 executing program 7: ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000300)) ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, &(0x7f0000000080)) 04:44:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000540)=ANY=[], &(0x7f00000000c0)) 04:44:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180)=""/227, &(0x7f0000000280)=0xe3) [ 836.516739] audit: type=1326 audit(1529729088.515:1552): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20405 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 836.580153] audit: type=1326 audit(1529729088.537:1553): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20399 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:48 executing program 7: ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000300)) ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, &(0x7f0000000080)) 04:44:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') sysfs$3(0x3) 04:44:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) 04:44:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) process_vm_writev(0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0), 0x0, 0x0) 04:44:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]}) socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180)=""/227, &(0x7f0000000280)=0xe3) [ 836.736141] audit: type=1326 audit(1529729088.734:1554): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20420 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:48 executing program 7: ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000300)) ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, &(0x7f0000000080)) 04:44:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]}) socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180)=""/227, &(0x7f0000000280)=0xe3) [ 836.769713] audit: type=1326 audit(1529729088.763:1555): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20426 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) 04:44:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]}) socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180)=""/227, &(0x7f0000000280)=0xe3) 04:44:49 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000300)) ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, &(0x7f0000000080)) 04:44:49 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000300)) ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, &(0x7f0000000080)) 04:44:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) 04:44:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180)=""/227, &(0x7f0000000280)=0xe3) 04:44:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000040)) 04:44:49 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000540)=ANY=[], &(0x7f00000000c0)) 04:44:49 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) [ 837.495209] audit: type=1326 audit(1529729089.493:1556): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20454 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:49 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000300)) ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, &(0x7f0000000080)) [ 837.556627] audit: type=1326 audit(1529729089.527:1557): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20459 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:49 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) fcntl$getown(0xffffffffffffff9c, 0x9) socket$inet6(0xa, 0x0, 0x0) 04:44:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) process_vm_writev(0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0), 0x0, 0x0) 04:44:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) 04:44:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000040)) 04:44:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000300)) ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, &(0x7f0000000080)) 04:44:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) socket$nl_route(0x10, 0x3, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, &(0x7f00000000c0)) 04:44:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000300)) ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, &(0x7f0000000080)) 04:44:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) 04:44:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000040)) 04:44:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) 04:44:50 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000300)) ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, &(0x7f0000000080)) 04:44:50 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) socket$nl_route(0x10, 0x3, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, &(0x7f00000000c0)) 04:44:50 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000300)) ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, &(0x7f0000000080)) 04:44:50 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000540)=ANY=[], &(0x7f00000000c0)) 04:44:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180)=""/227, &(0x7f0000000280)=0xe3) 04:44:50 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) socket$nl_route(0x10, 0x3, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, &(0x7f00000000c0)) 04:44:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000040)) 04:44:50 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) fcntl$getown(0xffffffffffffff9c, 0x9) socket$inet6(0xa, 0x0, 0x0) 04:44:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) process_vm_writev(0x0, &(0x7f0000000280), 0x0, &(0x7f00000004c0), 0x0, 0x0) 04:44:50 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000300)) ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, &(0x7f0000000080)) 04:44:50 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) fcntl$getown(0xffffffffffffff9c, 0x9) socket$inet6(0xa, 0x0, 0x0) 04:44:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000040)) 04:44:50 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50205}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) 04:44:50 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000300)) ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, &(0x7f0000000080)) 04:44:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000040)) 04:44:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) 04:44:50 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) fcntl$getown(0xffffffffffffff9c, 0x9) socket$inet6(0xa, 0x0, 0x0) 04:44:50 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50205}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) 04:44:50 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000300)) ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, &(0x7f0000000080)) 04:44:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) socket$inet6(0xa, 0x0, 0x0) 04:44:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000040)) 04:44:51 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180)=""/227, &(0x7f0000000280)=0xe3) 04:44:51 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50205}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) 04:44:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) socket$key(0xf, 0x3, 0x2) 04:44:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) socket$key(0xf, 0x3, 0x2) 04:44:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) socket$inet6(0xa, 0x0, 0x0) 04:44:51 executing program 3: shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000040)) 04:44:51 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50205}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) 04:44:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50192}]}) socket$inet_udplite(0x2, 0x2, 0x88) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000003c0)}, 0x0) 04:44:51 executing program 3: shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000040)) 04:44:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) socket$key(0xf, 0x3, 0x2) 04:44:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) 04:44:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) socket$inet6(0xa, 0x0, 0x0) 04:44:51 executing program 3: shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000040)) 04:44:51 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50205}]}) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) 04:44:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50205}]}) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) 04:44:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000300)) ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, &(0x7f0000000080)) 04:44:52 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000040)) 04:44:52 executing program 1: fcntl$getown(0xffffffffffffff9c, 0x9) socket$inet6(0xa, 0x0, 0x0) 04:44:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) socket$key(0xf, 0x3, 0x2) 04:44:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) 04:44:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) clock_adjtime(0x0, &(0x7f0000000080)) 04:44:52 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000040)) 04:44:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) socket$key(0xf, 0x3, 0x2) 04:44:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50205}]}) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) 04:44:52 executing program 1: fcntl$getown(0xffffffffffffff9c, 0x9) socket$inet6(0xa, 0x0, 0x0) 04:44:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) 04:44:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) socket$key(0xf, 0x3, 0x2) 04:44:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) clock_adjtime(0x0, &(0x7f0000000080)) 04:44:52 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000040)) 04:44:52 executing program 6: ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) 04:44:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) add_key(&(0x7f0000000240)='blacklist\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a}, &(0x7f00000002c0), 0x0, 0xfffffffffffffffd) 04:44:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) 04:44:52 executing program 1: fcntl$getown(0xffffffffffffff9c, 0x9) socket$inet6(0xa, 0x0, 0x0) 04:44:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000300)) ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, &(0x7f0000000080)) 04:44:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000040)) 04:44:53 executing program 6: ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) 04:44:53 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) socket$key(0xf, 0x3, 0x2) 04:44:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) 04:44:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) clock_adjtime(0x0, &(0x7f0000000080)) 04:44:53 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) fcntl$getown(0xffffffffffffff9c, 0x9) socket$inet6(0xa, 0x0, 0x0) 04:44:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) add_key(&(0x7f0000000240)='blacklist\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a}, &(0x7f00000002c0), 0x0, 0xfffffffffffffffd) [ 841.382518] kauditd_printk_skb: 10 callbacks suppressed [ 841.382541] audit: type=1326 audit(1529729093.381:1568): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20711 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) 04:44:53 executing program 6: ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) 04:44:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000040)) 04:44:53 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) socket$key(0xf, 0x3, 0x2) 04:44:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) clock_adjtime(0x0, &(0x7f0000000080)) 04:44:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) add_key(&(0x7f0000000240)='blacklist\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a}, &(0x7f00000002c0), 0x0, 0xfffffffffffffffd) 04:44:53 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) fcntl$getown(0xffffffffffffff9c, 0x9) socket$inet6(0xa, 0x0, 0x0) 04:44:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) 04:44:54 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) fcntl$getown(0xffffffffffffff9c, 0x9) socket$inet6(0xa, 0x0, 0x0) 04:44:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000040)) 04:44:54 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) socket$key(0xf, 0x3, 0x2) 04:44:54 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50205}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) 04:44:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) clock_adjtime(0x0, &(0x7f0000000080)) 04:44:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) 04:44:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) add_key(&(0x7f0000000240)='blacklist\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a}, &(0x7f00000002c0), 0x0, 0xfffffffffffffffd) 04:44:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) epoll_create(0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) 04:44:54 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50205}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) 04:44:54 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) socket$key(0xf, 0x3, 0x2) 04:44:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501df}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000040)) 04:44:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) ftruncate(0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 04:44:54 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) 04:44:54 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) fcntl$getown(0xffffffffffffff9c, 0x9) socket$inet6(0xa, 0x0, 0x0) 04:44:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) clock_adjtime(0x0, &(0x7f0000000080)) 04:44:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) epoll_create(0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) 04:44:54 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50205}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) 04:44:54 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) socket$key(0xf, 0x3, 0x2) 04:44:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501df}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000040)) 04:44:54 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) 04:44:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) clock_adjtime(0x0, &(0x7f0000000080)) 04:44:54 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) fcntl$getown(0xffffffffffffff9c, 0x9) socket$inet6(0xa, 0x0, 0x0) 04:44:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) shmctl$SHM_LOCK(0x0, 0xb) 04:44:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) 04:44:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) epoll_create(0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) 04:44:54 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) socket$key(0xf, 0x3, 0x2) 04:44:54 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) 04:44:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501df}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000040)) 04:44:55 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) 04:44:55 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) clock_adjtime(0x0, &(0x7f0000000080)) 04:44:55 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) socket$key(0xf, 0x3, 0x2) 04:44:55 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]}) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') 04:44:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000040)) 04:44:55 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) fcntl$getown(0xffffffffffffff9c, 0x9) socket$inet6(0xa, 0x0, 0x0) 04:44:55 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) 04:44:55 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) fdatasync(0xffffffffffffffff) 04:44:55 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) [ 843.251000] audit: type=1326 audit(1529729095.249:1569): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20850 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:55 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) clock_adjtime(0x0, &(0x7f0000000080)) 04:44:55 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) socket$key(0xf, 0x3, 0x2) 04:44:55 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) 04:44:55 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]}) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') 04:44:55 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) clock_adjtime(0x0, &(0x7f0000000080)) 04:44:55 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) fcntl$getown(0xffffffffffffff9c, 0x9) socket$inet6(0xa, 0x0, 0x0) 04:44:55 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50205}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) 04:44:55 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) fdatasync(0xffffffffffffffff) 04:44:55 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) 04:44:55 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) socket$key(0xf, 0x3, 0x2) 04:44:55 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]}) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') 04:44:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) fcntl$getown(0xffffffffffffff9c, 0x9) socket$inet6(0xa, 0x0, 0x0) 04:44:56 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]}) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') 04:44:56 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) clock_adjtime(0x0, &(0x7f0000000080)) 04:44:56 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) 04:44:56 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50205}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) 04:44:56 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) fdatasync(0xffffffffffffffff) 04:44:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000040)) 04:44:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) socket$key(0xf, 0x3, 0x2) 04:44:56 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50205}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) [ 844.212731] audit: type=1326 audit(1529729096.211:1570): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20923 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:56 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) 04:44:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) socket$key(0xf, 0x3, 0x2) 04:44:56 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) clock_adjtime(0x0, &(0x7f0000000080)) 04:44:56 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) fdatasync(0xffffffffffffffff) 04:44:56 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]}) renameat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') 04:44:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) fcntl$getown(0xffffffffffffff9c, 0x9) socket$inet6(0xa, 0x0, 0x0) 04:44:56 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) 04:44:56 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) [ 844.518154] audit: type=1326 audit(1529729096.516:1571): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20947 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000040)) 04:44:57 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) clock_adjtime(0x0, &(0x7f0000000080)) 04:44:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) socket$key(0xf, 0x3, 0x2) 04:44:57 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]}) renameat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') 04:44:57 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) fdatasync(0xffffffffffffffff) 04:44:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) 04:44:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) fcntl$getown(0xffffffffffffff9c, 0x9) socket$inet6(0xa, 0x0, 0x0) [ 845.142298] audit: type=1326 audit(1529729097.140:1572): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20962 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) 04:44:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) clock_adjtime(0x0, &(0x7f0000000080)) [ 845.240277] audit: type=1326 audit(1529729097.169:1573): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20964 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:57 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) fdatasync(0xffffffffffffffff) 04:44:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) socket$key(0xf, 0x3, 0x2) 04:44:57 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]}) renameat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') 04:44:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) 04:44:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) clock_adjtime(0x0, &(0x7f0000000080)) 04:44:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) 04:44:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) socket$key(0xf, 0x3, 0x2) [ 845.556757] audit: type=1326 audit(1529729097.555:1574): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21005 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 845.610857] audit: type=1326 audit(1529729097.577:1575): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20999 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) 04:44:58 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) fdatasync(0xffffffffffffffff) 04:44:58 executing program 7: ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') 04:44:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) clock_adjtime(0x0, &(0x7f0000000080)) 04:44:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50355}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000240)}) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 04:44:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) fcntl$getown(0xffffffffffffff9c, 0x9) socket$inet6(0xa, 0x0, 0x0) [ 846.089476] audit: type=1326 audit(1529729098.088:1576): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21015 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:58 executing program 7: ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') 04:44:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) clock_adjtime(0x0, &(0x7f0000000080)) [ 846.170173] audit: type=1326 audit(1529729098.168:1577): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21025 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:58 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) fdatasync(0xffffffffffffffff) 04:44:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50355}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000240)}) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 04:44:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) clock_adjtime(0x0, &(0x7f0000000080)) 04:44:58 executing program 7: ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') 04:44:58 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) fdatasync(0xffffffffffffffff) 04:44:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50355}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000240)}) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 04:44:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) 04:44:58 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) socket$key(0xf, 0x3, 0x2) [ 846.610258] audit: type=1326 audit(1529729098.608:1578): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21058 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 846.674412] audit: type=1326 audit(1529729098.634:1579): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21059 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x50232}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) clock_adjtime(0x0, &(0x7f0000000080)) 04:44:59 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) fdatasync(0xffffffffffffffff) 04:44:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50355}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000240)}) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 04:44:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) 04:44:59 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]}) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') 04:44:59 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) fdatasync(0xffffffffffffffff) 04:44:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) fcntl$getown(0xffffffffffffff9c, 0x9) socket$inet6(0xa, 0x0, 0x0) 04:44:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) clock_adjtime(0x0, &(0x7f0000000080)) [ 847.196203] audit: type=1326 audit(1529729099.194:1580): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21075 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50355}]}) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) [ 847.300976] audit: type=1326 audit(1529729099.232:1581): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21078 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 847.320934] audit: type=1326 audit(1529729099.285:1582): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21084 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:59 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) fdatasync(0xffffffffffffffff) 04:44:59 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]}) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') 04:44:59 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) fdatasync(0xffffffffffffffff) 04:44:59 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50358}]}) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') 04:44:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50355}]}) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 04:44:59 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) socket$key(0xf, 0x3, 0x2) 04:44:59 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000100)) 04:44:59 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) fdatasync(0xffffffffffffffff) [ 847.679898] audit: type=1326 audit(1529729099.678:1583): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21109 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:44:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') 04:44:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50355}]}) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 04:44:59 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) fdatasync(0xffffffffffffffff) 04:45:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) 04:45:00 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) fdatasync(0xffffffffffffffff) 04:45:00 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000100)) 04:45:00 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) clock_adjtime(0x0, &(0x7f0000000080)) 04:45:00 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000240)}) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 04:45:00 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') 04:45:00 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) ustat(0x0, &(0x7f0000000000)) sigaltstack(&(0x7f0000fff000/0x1000)=nil, &(0x7f0000000080)) [ 848.213597] audit: type=1326 audit(1529729100.211:1584): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21136 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:45:00 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) fdatasync(0xffffffffffffffff) 04:45:00 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') [ 848.321262] audit: type=1326 audit(1529729100.299:1585): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21146 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:45:00 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000100)) 04:45:00 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) fdatasync(0xffffffffffffffff) 04:45:00 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000240)}) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 04:45:00 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) ustat(0x0, &(0x7f0000000000)) sigaltstack(&(0x7f0000fff000/0x1000)=nil, &(0x7f0000000080)) 04:45:00 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50358}]}) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') 04:45:00 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000100)) 04:45:00 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) 04:45:01 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) 04:45:01 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000240)}) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 04:45:01 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50358}]}) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') 04:45:01 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000100)) 04:45:01 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) clock_adjtime(0x0, &(0x7f0000000080)) 04:45:01 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) ustat(0x0, &(0x7f0000000000)) sigaltstack(&(0x7f0000fff000/0x1000)=nil, &(0x7f0000000080)) 04:45:01 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) fdatasync(0xffffffffffffffff) 04:45:01 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50358}]}) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') 04:45:01 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50355}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000240)}) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 04:45:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) keyctl$set_reqkey_keyring(0xe, 0x0) 04:45:01 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) 04:45:01 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') [ 849.342764] audit: type=1326 audit(1529729101.341:1586): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21208 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:45:01 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) fdatasync(0xffffffffffffffff) 04:45:01 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50355}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000240)}) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 04:45:01 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000100)) 04:45:01 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) ustat(0x0, &(0x7f0000000000)) sigaltstack(&(0x7f0000fff000/0x1000)=nil, &(0x7f0000000080)) [ 849.481344] audit: type=1326 audit(1529729101.458:1587): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21214 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:45:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) keyctl$set_reqkey_keyring(0xe, 0x0) 04:45:01 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) 04:45:01 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50355}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000240)}) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 04:45:01 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000100)) 04:45:02 executing program 6: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000100)) 04:45:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) sigaltstack(&(0x7f0000fff000/0x1000)=nil, &(0x7f0000000080)) 04:45:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) keyctl$set_reqkey_keyring(0xe, 0x0) 04:45:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000240)}) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 04:45:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000240)=""/189, &(0x7f0000000300)=0xbd) 04:45:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) 04:45:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000240)}) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 04:45:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) sigaltstack(&(0x7f0000fff000/0x1000)=nil, &(0x7f0000000080)) 04:45:02 executing program 6: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000100)) 04:45:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) 04:45:02 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) fdatasync(0xffffffffffffffff) 04:45:02 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') 04:45:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) keyctl$set_reqkey_keyring(0xe, 0x0) 04:45:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000240)=""/189, &(0x7f0000000300)=0xbd) 04:45:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000240)}) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 04:45:02 executing program 6: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000100)) 04:45:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) 04:45:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) sigaltstack(&(0x7f0000fff000/0x1000)=nil, &(0x7f0000000080)) 04:45:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) keyctl$set_reqkey_keyring(0xe, 0x0) 04:45:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000240)=""/189, &(0x7f0000000300)=0xbd) 04:45:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50355}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000240)}) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 04:45:02 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000100)) 04:45:02 executing program 4: dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) 04:45:03 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50355}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000240)}) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 04:45:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') 04:45:03 executing program 4: dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) 04:45:03 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) fdatasync(0xffffffffffffffff) 04:45:03 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50355}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000240)}) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 04:45:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000240)=""/189, &(0x7f0000000300)=0xbd) 04:45:03 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000100)) 04:45:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) keyctl$set_reqkey_keyring(0xe, 0x0) 04:45:03 executing program 1: ustat(0x0, &(0x7f0000000000)) sigaltstack(&(0x7f0000fff000/0x1000)=nil, &(0x7f0000000080)) 04:45:03 executing program 4: dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) 04:45:03 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000100)) 04:45:03 executing program 1: ustat(0x0, &(0x7f0000000000)) sigaltstack(&(0x7f0000fff000/0x1000)=nil, &(0x7f0000000080)) 04:45:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) keyctl$set_reqkey_keyring(0xe, 0x0) 04:45:03 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000240)}) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) [ 851.791690] kauditd_printk_skb: 5 callbacks suppressed [ 851.791711] audit: type=1326 audit(1529729103.790:1593): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21351 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:45:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000240)=""/189, &(0x7f0000000300)=0xbd) 04:45:03 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) 04:45:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000100)) 04:45:04 executing program 1: ustat(0x0, &(0x7f0000000000)) sigaltstack(&(0x7f0000fff000/0x1000)=nil, &(0x7f0000000080)) 04:45:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000100)) 04:45:04 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) 04:45:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000240)=""/189, &(0x7f0000000300)=0xbd) 04:45:04 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) ustat(0x0, &(0x7f0000000000)) sigaltstack(&(0x7f0000fff000/0x1000)=nil, &(0x7f0000000080)) 04:45:04 executing program 2: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) keyctl$set_reqkey_keyring(0xe, 0x0) 04:45:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) socket$nl_generic(0x10, 0x3, 0x10) 04:45:04 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50355}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000240)}) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) 04:45:04 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) 04:45:04 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) ustat(0x0, &(0x7f0000000000)) sigaltstack(&(0x7f0000fff000/0x1000)=nil, &(0x7f0000000080)) 04:45:04 executing program 2: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) keyctl$set_reqkey_keyring(0xe, 0x0) 04:45:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000240)}) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 04:45:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000100)) 04:45:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000240)=""/189, &(0x7f0000000300)=0xbd) 04:45:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) socket$nl_generic(0x10, 0x3, 0x10) 04:45:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) [ 852.870617] audit: type=1326 audit(1529729104.869:1594): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21411 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:45:04 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50355}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000240)}) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) 04:45:04 executing program 2: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) keyctl$set_reqkey_keyring(0xe, 0x0) 04:45:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000100)) 04:45:04 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x50355}]}) ustat(0x0, &(0x7f0000000000)) sigaltstack(&(0x7f0000fff000/0x1000)=nil, &(0x7f0000000080)) 04:45:05 executing program 0: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000240)=""/189, &(0x7f0000000300)=0xbd) 04:45:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) 04:45:05 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) socket$nl_generic(0x10, 0x3, 0x10) 04:45:05 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000100)) 04:45:05 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) keyctl$set_reqkey_keyring(0xe, 0x0) 04:45:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50355}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000240)}) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) 04:45:05 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000300)}) ustat(0x0, &(0x7f0000000000)) sigaltstack(&(0x7f0000fff000/0x1000)=nil, &(0x7f0000000080)) 04:45:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000240)}) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 04:45:05 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000100)) 04:45:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) 04:45:05 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) keyctl$set_reqkey_keyring(0xe, 0x0) 04:45:05 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) socket$nl_generic(0x10, 0x3, 0x10) 04:45:05 executing program 0: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000240)=""/189, &(0x7f0000000300)=0xbd) 04:45:05 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000300)}) ustat(0x0, &(0x7f0000000000)) sigaltstack(&(0x7f0000fff000/0x1000)=nil, &(0x7f0000000080)) 04:45:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50355}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000240)}) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) 04:45:05 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) keyctl$set_reqkey_keyring(0xe, 0x0) [ 853.863642] audit: type=1326 audit(1529729105.862:1595): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21476 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:45:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) 04:45:05 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000300)}) ustat(0x0, &(0x7f0000000000)) sigaltstack(&(0x7f0000fff000/0x1000)=nil, &(0x7f0000000080)) 04:45:05 executing program 0: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000240)=""/189, &(0x7f0000000300)=0xbd) 04:45:06 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000100)) 04:45:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50355}]}) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) 04:45:06 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) socket$nl_generic(0x10, 0x3, 0x10) [ 854.068675] audit: type=1326 audit(1529729106.067:1596): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21492 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:45:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) keyctl$set_reqkey_keyring(0xe, 0x0) 04:45:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x50355}]}) ustat(0x0, &(0x7f0000000000)) sigaltstack(&(0x7f0000fff000/0x1000)=nil, &(0x7f0000000080)) 04:45:06 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000240)=""/189, &(0x7f0000000300)=0xbd) 04:45:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) keyctl$set_reqkey_keyring(0xe, 0x0) 04:45:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) 04:45:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50355}]}) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) 04:45:06 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) socket$nl_generic(0x10, 0x3, 0x10) 04:45:06 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) shmctl$IPC_RMID(0x0, 0x0) 04:45:06 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000240)=""/189, &(0x7f0000000300)=0xbd) 04:45:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) keyctl$set_reqkey_keyring(0xe, 0x0) 04:45:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) 04:45:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x50355}]}) ustat(0x0, &(0x7f0000000000)) sigaltstack(&(0x7f0000fff000/0x1000)=nil, &(0x7f0000000080)) 04:45:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50355}]}) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) 04:45:07 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) socket$nl_generic(0x10, 0x3, 0x10) 04:45:07 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) shmctl$IPC_RMID(0x0, 0x0) 04:45:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000100)) 04:45:07 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000240)=""/189, &(0x7f0000000300)=0xbd) 04:45:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) 04:45:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) keyctl$set_reqkey_keyring(0xe, 0x0) [ 855.202800] audit: type=1326 audit(1529729107.201:1597): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21545 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:45:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x50355}]}) ustat(0x0, &(0x7f0000000000)) sigaltstack(&(0x7f0000fff000/0x1000)=nil, &(0x7f0000000080)) 04:45:07 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000240)}) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) [ 855.314349] audit: type=1326 audit(1529729107.281:1598): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21554 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:45:07 executing program 7: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) socket$nl_generic(0x10, 0x3, 0x10) 04:45:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) keyctl$set_reqkey_keyring(0xe, 0x0) 04:45:07 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) shmctl$IPC_RMID(0x0, 0x0) 04:45:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000240)=""/189, &(0x7f0000000300)=0xbd) 04:45:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6}]}) ustat(0x0, &(0x7f0000000000)) sigaltstack(&(0x7f0000fff000/0x1000)=nil, &(0x7f0000000080)) 04:45:07 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000240)}) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) 04:45:07 executing program 7: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) socket$nl_generic(0x10, 0x3, 0x10) 04:45:07 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) shmctl$IPC_RMID(0x0, 0x0) 04:45:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) keyctl$set_reqkey_keyring(0xe, 0x0) [ 855.635567] audit: type=1326 audit(1529729107.634:1599): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21579 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:45:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000240)=""/189, &(0x7f0000000300)=0xbd) 04:45:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000100)) 04:45:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) 04:45:08 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000240)=""/189, &(0x7f0000000300)=0xbd) 04:45:08 executing program 7: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) socket$nl_generic(0x10, 0x3, 0x10) 04:45:08 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000240)}) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) 04:45:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) keyctl$set_reqkey_keyring(0xe, 0x0) 04:45:08 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) shmctl$IPC_RMID(0x0, 0x0) [ 856.152281] audit: type=1326 audit(1529729108.151:1600): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21602 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 856.243214] audit: type=1326 audit(1529729108.241:1601): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21613 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:45:08 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) socket$nl_generic(0x10, 0x3, 0x10) 04:45:08 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) shmctl$IPC_RMID(0x0, 0x0) [ 856.315641] audit: type=1326 audit(1529729108.295:1602): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21606 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:45:08 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000240)=""/189, &(0x7f0000000300)=0xbd) 04:45:08 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) socket$nl_generic(0x10, 0x3, 0x10) 04:45:08 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50355}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000240)}) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) 04:45:08 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000240)=""/189, &(0x7f0000000300)=0xbd) 04:45:08 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) shmctl$IPC_RMID(0x0, 0x0) 04:45:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6}]}) ustat(0x0, &(0x7f0000000000)) sigaltstack(&(0x7f0000fff000/0x1000)=nil, &(0x7f0000000080)) 04:45:08 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50355}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000240)}) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) 04:45:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000240)=""/189, &(0x7f0000000300)=0xbd) 04:45:09 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) 04:45:09 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) socket$nl_generic(0x10, 0x3, 0x10) 04:45:09 executing program 3: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) shmctl$IPC_RMID(0x0, 0x0) 04:45:09 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50355}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000240)}) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) 04:45:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) keyctl$set_reqkey_keyring(0xe, 0x0) 04:45:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000240)=""/189, &(0x7f0000000300)=0xbd) 04:45:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) msgctl$IPC_RMID(0x0, 0x0) [ 857.229440] kauditd_printk_skb: 1 callbacks suppressed [ 857.229463] audit: type=1326 audit(1529729109.228:1604): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21664 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:45:09 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000240)}) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) 04:45:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) socket$nl_generic(0x10, 0x3, 0x10) 04:45:09 executing program 3: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) shmctl$IPC_RMID(0x0, 0x0) [ 857.349436] audit: type=1326 audit(1529729109.254:1605): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21663 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:45:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) msgctl$IPC_RMID(0x0, 0x0) 04:45:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6}]}) ustat(0x0, &(0x7f0000000000)) sigaltstack(&(0x7f0000fff000/0x1000)=nil, &(0x7f0000000080)) [ 857.674273] audit: type=1326 audit(1529729109.673:1606): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21679 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 857.675525] device bridge_slave_1 left promiscuous mode [ 857.699744] bridge0: port 2(bridge_slave_1) entered disabled state 04:45:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) msgctl$IPC_RMID(0x0, 0x0) [ 857.783060] device bridge_slave_0 left promiscuous mode [ 857.789062] bridge0: port 1(bridge_slave_0) entered disabled state 04:45:09 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000240)}) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) 04:45:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) socket$nl_generic(0x10, 0x3, 0x10) 04:45:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) keyctl$set_reqkey_keyring(0xe, 0x0) [ 857.860732] team0 (unregistering): Port device team_slave_1 removed [ 857.879729] team0 (unregistering): Port device team_slave_0 removed [ 857.892905] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 857.921753] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 857.967534] bond0 (unregistering): Released all slaves 04:45:10 executing program 3: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) shmctl$IPC_RMID(0x0, 0x0) 04:45:10 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) msgctl$IPC_RMID(0x0, 0x0) 04:45:10 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socket$netlink(0x10, 0x3, 0x0) 04:45:10 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000240)=""/189, &(0x7f0000000300)=0xbd) [ 858.254419] audit: type=1326 audit(1529729110.253:1607): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21698 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 858.333531] IPVS: ftp: loaded support on port[0] = 21 04:45:10 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) msgctl$IPC_RMID(0x0, 0x0) 04:45:10 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socket$netlink(0x10, 0x3, 0x0) 04:45:10 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) msgctl$IPC_RMID(0x0, 0x0) 04:45:10 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, @multicast2}, &(0x7f0000000200)=0x10, 0x0) [ 858.677760] IPVS: ftp: loaded support on port[0] = 21 04:45:10 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socket$netlink(0x10, 0x3, 0x0) [ 858.719554] IPVS: ftp: loaded support on port[0] = 21 04:45:10 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) msgctl$IPC_RMID(0x0, 0x0) 04:45:10 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, @multicast2}, &(0x7f0000000200)=0x10, 0x0) 04:45:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socket$netlink(0x10, 0x3, 0x0) [ 858.990769] IPVS: ftp: loaded support on port[0] = 21 04:45:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) socket$netlink(0x10, 0x3, 0x0) [ 860.490744] device bridge_slave_1 left promiscuous mode [ 860.496435] bridge0: port 2(bridge_slave_1) entered disabled state [ 860.517510] device bridge_slave_0 left promiscuous mode [ 860.523300] bridge0: port 1(bridge_slave_0) entered disabled state [ 860.546595] device bridge_slave_1 left promiscuous mode [ 860.552265] bridge0: port 2(bridge_slave_1) entered disabled state [ 860.569956] device bridge_slave_0 left promiscuous mode [ 860.575648] bridge0: port 1(bridge_slave_0) entered disabled state [ 860.590712] device bridge_slave_1 left promiscuous mode [ 860.596396] bridge0: port 2(bridge_slave_1) entered disabled state [ 860.607917] device bridge_slave_0 left promiscuous mode [ 860.613567] bridge0: port 1(bridge_slave_0) entered disabled state [ 860.626572] device bridge_slave_1 left promiscuous mode [ 860.632351] bridge0: port 2(bridge_slave_1) entered disabled state [ 860.643920] device bridge_slave_0 left promiscuous mode [ 860.649596] bridge0: port 1(bridge_slave_0) entered disabled state [ 860.663629] device bridge_slave_1 left promiscuous mode [ 860.669312] bridge0: port 2(bridge_slave_1) entered disabled state [ 860.716064] device bridge_slave_0 left promiscuous mode [ 860.721750] bridge0: port 1(bridge_slave_0) entered disabled state [ 860.944558] team0 (unregistering): Port device team_slave_1 removed [ 860.965811] team0 (unregistering): Port device team_slave_0 removed [ 860.983783] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 861.010139] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 861.059624] bond0 (unregistering): Released all slaves [ 861.095800] team0 (unregistering): Port device team_slave_1 removed [ 861.119600] team0 (unregistering): Port device team_slave_0 removed [ 861.136925] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 861.159189] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 861.199872] bond0 (unregistering): Released all slaves [ 861.241197] team0 (unregistering): Port device team_slave_1 removed [ 861.265849] team0 (unregistering): Port device team_slave_0 removed [ 861.283849] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 861.305838] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 861.339973] bond0 (unregistering): Released all slaves [ 861.360607] team0 (unregistering): Port device team_slave_1 removed [ 861.370293] team0 (unregistering): Port device team_slave_0 removed [ 861.380066] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 861.398734] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 861.422665] bond0 (unregistering): Released all slaves [ 861.445519] team0 (unregistering): Port device team_slave_1 removed [ 861.454783] team0 (unregistering): Port device team_slave_0 removed [ 861.464246] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 861.486690] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 861.510713] bond0 (unregistering): Released all slaves [ 861.572181] bridge0: port 1(bridge_slave_0) entered blocking state [ 861.578594] bridge0: port 1(bridge_slave_0) entered disabled state [ 861.585958] device bridge_slave_0 entered promiscuous mode [ 861.622399] bridge0: port 2(bridge_slave_1) entered blocking state [ 861.628802] bridge0: port 2(bridge_slave_1) entered disabled state [ 861.636211] device bridge_slave_1 entered promiscuous mode [ 861.672341] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 861.708741] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 861.909796] IPVS: ftp: loaded support on port[0] = 21 [ 861.948410] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 862.063620] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 862.632146] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 862.644852] team0: Port device team_slave_0 added [ 862.762841] IPVS: ftp: loaded support on port[0] = 21 [ 862.780946] IPVS: ftp: loaded support on port[0] = 21 [ 862.785212] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 862.800962] team0: Port device team_slave_1 added [ 862.925578] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 862.932657] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 862.941851] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 863.106358] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 863.113303] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 863.126806] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 863.286055] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 863.293562] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 863.306037] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 863.438440] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 863.445893] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 863.461111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 863.807532] bridge0: port 1(bridge_slave_0) entered blocking state [ 863.814078] bridge0: port 1(bridge_slave_0) entered disabled state [ 863.825984] device bridge_slave_0 entered promiscuous mode [ 863.945349] bridge0: port 2(bridge_slave_1) entered blocking state [ 863.951854] bridge0: port 2(bridge_slave_1) entered disabled state [ 863.975122] device bridge_slave_1 entered promiscuous mode [ 864.071277] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 864.173574] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 864.468853] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 864.586916] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 864.652290] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 864.659295] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 864.691376] bridge0: port 2(bridge_slave_1) entered blocking state [ 864.697892] bridge0: port 2(bridge_slave_1) entered forwarding state [ 864.704662] bridge0: port 1(bridge_slave_0) entered blocking state [ 864.711198] bridge0: port 1(bridge_slave_0) entered forwarding state [ 864.722057] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 864.735771] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 864.742787] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 864.891795] bridge0: port 1(bridge_slave_0) entered blocking state [ 864.898271] bridge0: port 1(bridge_slave_0) entered disabled state [ 864.906355] device bridge_slave_0 entered promiscuous mode [ 864.919386] bridge0: port 1(bridge_slave_0) entered blocking state [ 864.925822] bridge0: port 1(bridge_slave_0) entered disabled state [ 864.936241] device bridge_slave_0 entered promiscuous mode [ 865.020919] bridge0: port 2(bridge_slave_1) entered blocking state [ 865.027377] bridge0: port 2(bridge_slave_1) entered disabled state [ 865.036489] device bridge_slave_1 entered promiscuous mode [ 865.047165] bridge0: port 2(bridge_slave_1) entered blocking state [ 865.053656] bridge0: port 2(bridge_slave_1) entered disabled state [ 865.073571] device bridge_slave_1 entered promiscuous mode [ 865.102843] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 865.113645] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 865.142217] team0: Port device team_slave_0 added [ 865.178142] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 865.190593] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 865.269576] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 865.278791] team0: Port device team_slave_1 added [ 865.312427] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 865.419372] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 865.487597] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 865.556815] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 865.608210] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 865.626896] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 865.634621] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 865.643829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 865.670794] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 865.706673] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 865.727090] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 865.736353] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 865.744763] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 865.767985] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 865.775112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 865.810229] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 865.867435] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 865.874601] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 865.922604] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 865.929633] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 866.006298] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 866.015195] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 866.165199] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 866.179988] team0: Port device team_slave_0 added [ 866.282495] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 866.299924] team0: Port device team_slave_1 added [ 866.366594] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 866.376295] team0: Port device team_slave_0 added [ 866.394118] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 866.492403] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 866.522472] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 866.538191] team0: Port device team_slave_1 added [ 866.612838] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 866.633457] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 866.640843] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 866.654841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 866.683470] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 866.690479] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 866.699284] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 866.737629] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 866.745206] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 866.754317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 866.811871] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 866.819527] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 866.828823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 866.886691] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 866.894794] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 866.912722] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 867.064099] bridge0: port 2(bridge_slave_1) entered blocking state [ 867.070545] bridge0: port 2(bridge_slave_1) entered forwarding state [ 867.077317] bridge0: port 1(bridge_slave_0) entered blocking state [ 867.083721] bridge0: port 1(bridge_slave_0) entered forwarding state [ 867.091711] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 867.615692] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 867.926370] bridge0: port 2(bridge_slave_1) entered blocking state [ 867.932839] bridge0: port 2(bridge_slave_1) entered forwarding state [ 867.939642] bridge0: port 1(bridge_slave_0) entered blocking state [ 867.946068] bridge0: port 1(bridge_slave_0) entered forwarding state [ 867.973830] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 868.147465] bridge0: port 2(bridge_slave_1) entered blocking state [ 868.154086] bridge0: port 2(bridge_slave_1) entered forwarding state [ 868.160849] bridge0: port 1(bridge_slave_0) entered blocking state [ 868.167309] bridge0: port 1(bridge_slave_0) entered forwarding state [ 868.176101] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 868.639193] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 868.650561] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 869.232912] 8021q: adding VLAN 0 to HW filter on device bond0 [ 869.547642] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 870.012528] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 870.018885] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 870.027175] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 870.477329] 8021q: adding VLAN 0 to HW filter on device team0 [ 871.413214] 8021q: adding VLAN 0 to HW filter on device bond0 [ 871.833319] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 872.131739] 8021q: adding VLAN 0 to HW filter on device bond0 [ 872.180896] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 872.187233] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 872.200340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 872.522388] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 872.545861] 8021q: adding VLAN 0 to HW filter on device bond0 [ 872.584442] 8021q: adding VLAN 0 to HW filter on device team0 [ 872.895374] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 872.939950] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 872.946235] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 872.963280] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 873.220072] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 873.227088] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 873.250270] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 873.259223] 8021q: adding VLAN 0 to HW filter on device team0 [ 873.524772] 8021q: adding VLAN 0 to HW filter on device team0 04:45:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000240)}) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) 04:45:26 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000240)=""/189, &(0x7f0000000300)=0xbd) [ 874.983500] audit: type=1326 audit(1529729126.981:1608): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22765 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 875.026937] audit: type=1326 audit(1529729127.025:1609): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22768 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:45:27 executing program 6: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) msgctl$IPC_RMID(0x0, 0x0) 04:45:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 04:45:27 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) shmctl$IPC_RMID(0x0, 0x0) 04:45:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) socket$nl_generic(0x10, 0x3, 0x10) 04:45:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50355}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000240)}) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) 04:45:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) epoll_create(0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) 04:45:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) socket$netlink(0x10, 0x3, 0x0) 04:45:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, @multicast2}, &(0x7f0000000200)=0x10, 0x0) 04:45:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50355}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000240)}) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) 04:45:28 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) shmctl$IPC_RMID(0x0, 0x0) 04:45:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) socket$nl_generic(0x10, 0x3, 0x10) 04:45:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) socket$netlink(0x10, 0x3, 0x0) 04:45:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 04:45:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) epoll_create(0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) 04:45:28 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) shmctl$IPC_RMID(0x0, 0x0) 04:45:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50355}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000240)}) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) [ 876.576149] udevd: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 876.586919] udevd cpuset=/ mems_allowed=0 [ 876.591194] CPU: 1 PID: 2158 Comm: udevd Not tainted 4.17.0+ #9 [ 876.597265] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 876.606636] Call Trace: [ 876.609269] dump_stack+0x185/0x1d0 [ 876.612924] warn_alloc+0x430/0x690 [ 876.616603] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 876.621508] ? __msan_poison_alloca+0x15c/0x1d0 [ 876.626255] copy_process+0x778/0x9be0 [ 876.630164] ? expand_files+0x5b/0xe00 [ 876.634094] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 876.639486] ? expand_files+0xa6/0xe00 [ 876.643421] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 876.648822] ? find_next_zero_bit+0x12b/0x2f0 [ 876.653360] ? __msan_poison_alloca+0x141/0x1d0 [ 876.658062] _do_fork+0x353/0xf60 [ 876.661559] __x64_sys_clone+0x15e/0x1b0 [ 876.665655] ? __ia32_sys_vfork+0x70/0x70 [ 876.669829] do_syscall_64+0x15b/0x230 [ 876.673751] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 876.678960] RIP: 0033:0x7fcae3eb6f46 [ 876.682687] RSP: 002b:00007ffc4fa00ab0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 876.690434] RAX: ffffffffffffffda RBX: 00007ffc4fa00ab0 RCX: 00007fcae3eb6f46 [ 876.697728] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 876.705020] RBP: 00007ffc4fa00b10 R08: 000000000000086e R09: 000000000000086e [ 876.712312] R10: 00007fcae47d3a70 R11: 0000000000000246 R12: 0000000000000000 [ 876.719607] R13: 00007ffc4fa00ad0 R14: 0000000000000005 R15: 0000000000000005 [ 876.727014] Mem-Info: [ 876.729544] active_anon:163355 inactive_anon:78 isolated_anon:0 [ 876.729544] active_file:1872 inactive_file:3316 isolated_file:0 [ 876.729544] unevictable:0 dirty:54 writeback:0 unstable:0 [ 876.729544] slab_reclaimable:3472 slab_unreclaimable:9242 [ 876.729544] mapped:66781 shmem:84 pagetables:1241 bounce:0 [ 876.729544] free:25652 free_pcp:373 free_cma:0 [ 876.762810] Node 0 active_anon:653420kB inactive_anon:312kB active_file:7488kB inactive_file:11504kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:269444kB dirty:216kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 276480kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 876.790990] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 876.817300] lowmem_reserve[]: 0 2817 7244 7244 [ 876.822037] Node 0 DMA32 free:46908kB min:26224kB low:32780kB high:39336kB active_anon:206616kB inactive_anon:32kB active_file:4324kB inactive_file:8476kB unevictable:0kB writepending:200kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2112kB pagetables:2088kB bounce:0kB free_pcp:944kB local_pcp:248kB free_cma:0kB [ 876.851940] lowmem_reserve[]: 0 0 4426 4426 [ 876.856433] Node 0 Normal free:17940kB min:41208kB low:51508kB high:61808kB active_anon:447012kB inactive_anon:272kB active_file:2860kB inactive_file:296kB unevictable:0kB writepending:24kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7232kB pagetables:2828kB bounce:0kB free_pcp:740kB local_pcp:0kB free_cma:0kB [ 876.885642] lowmem_reserve[]: 0 0 0 0 [ 876.889546] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 876.903019] Node 0 DMA32: 1275*4kB (UME) 2802*8kB (UM) 524*16kB (UM) 111*32kB (UM) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 1*2048kB (H) 1*4096kB (H) = 45596kB [ 876.917588] Node 0 Normal: 2583*4kB (MH) 550*8kB (UMH) 2*16kB (H) 0*32kB 4*64kB (H) 1*128kB (H) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 15148kB [ 876.931309] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 876.939933] 3265 total pagecache pages [ 876.943877] 0 pages in swap cache [ 876.947410] Swap cache stats: add 0, delete 0, find 0/0 [ 876.952827] Free swap = 0kB [ 876.955910] Total swap = 0kB [ 876.958967] 1965969 pages RAM [ 876.962142] 0 pages HighMem/MovableOnly [ 876.966152] 106316 pages reserved [ 876.970184] udevd: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 876.981073] udevd cpuset=/ mems_allowed=0 [ 876.985361] CPU: 0 PID: 22800 Comm: udevd Not tainted 4.17.0+ #9 [ 876.991523] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 877.000894] Call Trace: [ 877.003527] dump_stack+0x185/0x1d0 [ 877.007195] warn_alloc+0x430/0x690 [ 877.010881] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 877.015790] ? __msan_poison_alloca+0x15c/0x1d0 [ 877.020544] copy_process+0x778/0x9be0 [ 877.024459] ? expand_files+0x5b/0xe00 [ 877.028392] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 877.033781] ? expand_files+0xa6/0xe00 [ 877.037715] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 877.043109] ? find_next_zero_bit+0x12b/0x2f0 [ 877.047646] ? __msan_poison_alloca+0x141/0x1d0 [ 877.052356] _do_fork+0x353/0xf60 [ 877.055852] __x64_sys_clone+0x15e/0x1b0 [ 877.059949] ? __ia32_sys_vfork+0x70/0x70 [ 877.064117] do_syscall_64+0x15b/0x230 [ 877.068129] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 877.073340] RIP: 0033:0x7fcae3eb6f46 [ 877.077066] RSP: 002b:00007ffc4fa00ab0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 877.084807] RAX: ffffffffffffffda RBX: 00007ffc4fa00ab0 RCX: 00007fcae3eb6f46 [ 877.092094] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 877.099377] RBP: 00007ffc4fa00b10 R08: 0000000000005910 R09: 0000000000005910 [ 877.106667] R10: 00007fcae47d3a70 R11: 0000000000000246 R12: 0000000000000000 [ 877.113953] R13: 00007ffc4fa00ad0 R14: 0000000000000005 R15: 0000000000000005 [ 877.293807] syz-executor6: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 877.305446] syz-executor6 cpuset=/ mems_allowed=0 [ 877.310642] CPU: 0 PID: 22777 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 877.317500] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 877.326853] Call Trace: [ 877.329456] dump_stack+0x185/0x1d0 [ 877.333090] warn_alloc+0x430/0x690 [ 877.336739] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 877.341610] ? __msan_poison_alloca+0x15c/0x1d0 [ 877.346310] copy_process+0x778/0x9be0 [ 877.350212] ? __msan_poison_alloca+0x15c/0x1d0 [ 877.354894] ? handle_mm_fault+0x74eb/0x7ed0 [ 877.359332] ? handle_mm_fault+0x74eb/0x7ed0 [ 877.363745] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 877.369120] ? lru_cache_add_active_or_unevictable+0x3da/0x5f0 [ 877.375112] ? handle_mm_fault+0x1eb0/0x7ed0 [ 877.379529] ? __msan_poison_alloca+0x141/0x1d0 [ 877.384206] _do_fork+0x353/0xf60 [ 877.387674] __x64_sys_clone+0x15e/0x1b0 [ 877.391743] ? __ia32_sys_vfork+0x70/0x70 [ 877.395888] do_syscall_64+0x15b/0x230 [ 877.399873] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 877.405058] RIP: 0033:0x458429 [ 877.408243] RSP: 002b:00007ffdf2829ff8 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 877.415957] RAX: ffffffffffffffda RBX: 00007ffdf282a0b0 RCX: 0000000000458429 [ 877.423227] RDX: 434f503a30656c69 RSI: 0000000000a3ffb0 RDI: 0000000030000000 [ 877.430494] RBP: 0000000000000000 R08: 000000000000001a R09: 000000000000001a [ 877.437758] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000411910 [ 877.445025] R13: 00000000004119a0 R14: 0000000000000000 R15: 0000000000000000 [ 879.585994] IPVS: ftp: loaded support on port[0] = 21 [ 882.583847] IPVS: ftp: loaded support on port[0] = 21 [ 883.213771] syz-executor1: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 883.225200] syz-executor1 cpuset=/ mems_allowed=0 [ 883.230177] CPU: 0 PID: 22844 Comm: syz-executor1 Not tainted 4.17.0+ #9 [ 883.237029] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 883.246401] Call Trace: [ 883.249035] dump_stack+0x185/0x1d0 [ 883.252703] warn_alloc+0x430/0x690 [ 883.256416] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 883.261331] ? __msan_poison_alloca+0x15c/0x1d0 [ 883.266087] copy_process+0x778/0x9be0 [ 883.270026] ? kmsan_set_origin_inline+0x6b/0x120 [ 883.274927] ? finish_task_switch+0x103/0x270 [ 883.279472] ? __msan_poison_alloca+0x141/0x1d0 [ 883.284201] _do_fork+0x353/0xf60 [ 883.287716] __x64_sys_clone+0x15e/0x1b0 [ 883.291811] ? __ia32_sys_vfork+0x70/0x70 [ 883.295984] do_syscall_64+0x15b/0x230 [ 883.299906] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 883.305114] RIP: 0033:0x41f8b9 [ 883.308319] RSP: 002b:0000000000a3fad0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 883.316058] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000041f8b9 [ 883.323347] RDX: 0000000000a3fadc RSI: 0000000000000000 RDI: 0000000000100011 [ 883.330636] RBP: 0000000000a3fc80 R08: 0000000000a44a60 R09: 0000000000000025 [ 883.337939] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000a3fe60 [ 883.345251] R13: 0000000000a3fe28 R14: 0000000000000000 R15: 0000000000000000 [ 883.352803] warn_alloc_show_mem: 2 callbacks suppressed [ 883.352810] Mem-Info: [ 883.360730] active_anon:163249 inactive_anon:74 isolated_anon:0 [ 883.360730] active_file:1028 inactive_file:3702 isolated_file:32 [ 883.360730] unevictable:0 dirty:7 writeback:0 unstable:0 [ 883.360730] slab_reclaimable:3460 slab_unreclaimable:9438 [ 883.360730] mapped:68663 shmem:80 pagetables:1159 bounce:0 [ 883.360730] free:20087 free_pcp:193 free_cma:0 [ 883.393996] Node 0 active_anon:652996kB inactive_anon:296kB active_file:4112kB inactive_file:9696kB unevictable:0kB isolated(anon):0kB isolated(file):128kB mapped:269548kB dirty:28kB writeback:0kB shmem:320kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 272384kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 883.422173] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 883.448482] lowmem_reserve[]: 0 2817 7244 7244 [ 883.453182] Node 0 DMA32 free:43572kB min:26224kB low:32780kB high:39336kB active_anon:206136kB inactive_anon:24kB active_file:2772kB inactive_file:8580kB unevictable:0kB writepending:28kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2112kB pagetables:1820kB bounce:0kB free_pcp:116kB local_pcp:0kB free_cma:0kB [ 883.482344] lowmem_reserve[]: 0 0 4426 4426 [ 883.486811] Node 0 Normal free:15004kB min:41208kB low:51508kB high:61808kB active_anon:446976kB inactive_anon:272kB active_file:2132kB inactive_file:0kB unevictable:0kB writepending:0kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7232kB pagetables:2816kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 883.515614] lowmem_reserve[]: 0 0 0 0 [ 883.519538] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 883.533060] Node 0 DMA32: 1834*4kB (ME) 2463*8kB (ME) 532*16kB (ME) 124*32kB (UM) 8*64kB (M) 0*128kB 1*256kB (U) 0*512kB 0*1024kB 2*2048kB (UH) 0*4096kB = 44384kB [ 883.548022] Node 0 Normal: 3008*4kB (UM) 470*8kB (UMH) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 15792kB [ 883.560698] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 883.569349] 2831 total pagecache pages [ 883.573314] 0 pages in swap cache [ 883.576811] Swap cache stats: add 0, delete 0, find 0/0 [ 883.582241] Free swap = 0kB [ 883.585296] Total swap = 0kB [ 883.588385] 1965969 pages RAM [ 883.591521] 0 pages HighMem/MovableOnly [ 883.595554] 106316 pages reserved [ 884.400698] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 884.406900] 8021q: adding VLAN 0 to HW filter on device bond0 [ 884.582246] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 884.756459] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 884.762783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 884.771602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 884.948337] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 884.954533] 8021q: adding VLAN 0 to HW filter on device team0 [ 885.083413] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 886.455508] syz-executor6: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 886.466931] syz-executor6 cpuset=/ mems_allowed=0 [ 886.471911] CPU: 0 PID: 22970 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 886.478759] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 886.488106] Call Trace: [ 886.490713] dump_stack+0x185/0x1d0 [ 886.494368] warn_alloc+0x430/0x690 [ 886.498028] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 886.502897] ? __msan_poison_alloca+0x15c/0x1d0 [ 886.507597] copy_process+0x778/0x9be0 [ 886.511499] ? __msan_poison_alloca+0x15c/0x1d0 [ 886.516180] ? handle_mm_fault+0x74eb/0x7ed0 [ 886.520602] ? handle_mm_fault+0x74eb/0x7ed0 [ 886.525032] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 886.530411] ? lru_cache_add_active_or_unevictable+0x3da/0x5f0 [ 886.536397] ? handle_mm_fault+0x1eb0/0x7ed0 [ 886.540809] ? __msan_poison_alloca+0x141/0x1d0 [ 886.545499] _do_fork+0x353/0xf60 [ 886.548971] __x64_sys_clone+0x15e/0x1b0 [ 886.553044] ? __ia32_sys_vfork+0x70/0x70 [ 886.557191] do_syscall_64+0x15b/0x230 [ 886.561087] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 886.566272] RIP: 0033:0x458429 [ 886.569457] RSP: 002b:00007ffc0cd5f978 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 886.577168] RAX: ffffffffffffffda RBX: 00007ffc0cd5fa30 RCX: 0000000000458429 [ 886.584436] RDX: 434f503a30656c69 RSI: 0000000000a3ffb0 RDI: 0000000030000000 [ 886.591699] RBP: 0000000000000000 R08: 000000000000001a R09: 000000000000001a [ 886.598967] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000411910 [ 886.606250] R13: 00000000004119a0 R14: 0000000000000000 R15: 0000000000000000 [ 886.613660] Mem-Info: [ 886.616178] active_anon:163236 inactive_anon:75 isolated_anon:0 [ 886.616178] active_file:62 inactive_file:35 isolated_file:0 [ 886.616178] unevictable:0 dirty:0 writeback:0 unstable:0 [ 886.616178] slab_reclaimable:3429 slab_unreclaimable:9463 [ 886.616178] mapped:65593 shmem:81 pagetables:1150 bounce:0 [ 886.616178] free:19829 free_pcp:38 free_cma:0 [ 886.648882] Node 0 active_anon:652944kB inactive_anon:300kB active_file:248kB inactive_file:140kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:262372kB dirty:0kB writeback:0kB shmem:324kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 272384kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 886.676525] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 886.702978] lowmem_reserve[]: 0 2817 7244 7244 [ 886.707700] Node 0 DMA32 free:45744kB min:26224kB low:32780kB high:39336kB active_anon:206188kB inactive_anon:28kB active_file:356kB inactive_file:368kB unevictable:0kB writepending:0kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2048kB pagetables:1836kB bounce:0kB free_pcp:124kB local_pcp:0kB free_cma:0kB [ 886.736695] lowmem_reserve[]: 0 0 4426 4426 [ 886.741276] Node 0 Normal free:17668kB min:41208kB low:51508kB high:61808kB active_anon:446756kB inactive_anon:272kB active_file:24kB inactive_file:40kB unevictable:0kB writepending:0kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7168kB pagetables:2764kB bounce:0kB free_pcp:84kB local_pcp:0kB free_cma:0kB [ 886.770617] lowmem_reserve[]: 0 0 0 0 [ 886.774646] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 886.788217] Node 0 DMA32: 1682*4kB (UME) 3295*8kB (UME) 471*16kB (ME) 108*32kB (UM) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 1*2048kB (H) 0*4096kB = 46128kB [ 886.802610] Node 0 Normal: 3192*4kB (UM) 592*8kB (UMH) 38*16kB (UM) 4*32kB (UM) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 18240kB [ 886.816313] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 886.825101] 213 total pagecache pages [ 886.829096] 0 pages in swap cache [ 886.832720] Swap cache stats: add 0, delete 0, find 0/0 [ 886.838222] Free swap = 0kB [ 886.841433] Total swap = 0kB [ 886.844621] 1965969 pages RAM [ 886.847864] 0 pages HighMem/MovableOnly [ 886.852020] 106316 pages reserved 2018/06/23 04:45:57 executor failed 11 times: executor 6: EOF sandbox clone failed (errno 12) [ 905.576233] ------------[ cut here ]------------ [ 905.581050] kernel BUG at mm/kmsan/kmsan.c:909! [ 905.585828] invalid opcode: 0000 [#1] SMP PTI [ 905.590340] Dumping ftrace buffer: [ 905.593884] (ftrace buffer empty) [ 905.597602] Modules linked in: [ 905.600829] CPU: 1 PID: 4507 Comm: syz-fuzzer Not tainted 4.17.0+ #9 [ 905.607327] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 905.616733] RIP: 0010:kmsan_free_page+0x2a6/0x2e0 [ 905.621588] RSP: 0000:ffff8801a590ee08 EFLAGS: 00010286 [ 905.626974] RAX: 0000000000000001 RBX: ffffea000150c0b0 RCX: 0000000000000009 [ 905.634263] RDX: ffff8801fd033c88 RSI: 0000000000000009 RDI: ffffea000150c000 [ 905.641549] RBP: ffff8801a590ee50 R08: 0000000001080020 R09: 0000000000000002 [ 905.648831] R10: 0000000000000000 R11: ffffffff81c36d50 R12: 0000000000000200 [ 905.656115] R13: 0000000000000009 R14: 0000000000000009 R15: ffffffff8b58d000 [ 905.663401] FS: 000000c420028068(0000) GS:ffff88021fd00000(0000) knlGS:0000000000000000 [ 905.671638] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 905.677530] CR2: 0000563f1b399e16 CR3: 000000000ac30000 CR4: 00000000001406e0 [ 905.684821] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 905.692108] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 905.699384] Call Trace: [ 905.702022] ? free_compound_page+0x8e/0xc0 [ 905.706374] __free_pages_ok+0x288/0x1680 [ 905.710549] ? kmsan_set_origin_inline+0x6b/0x120 [ 905.715411] ? __msan_poison_alloca+0x15c/0x1d0 [ 905.720112] free_compound_page+0x8e/0xc0 [ 905.724291] free_transhuge_page+0x3bc/0x470 [ 905.728738] ? split_huge_page_to_list+0x3520/0x3520 [ 905.733872] release_pages+0x6ff/0x1650 [ 905.737891] free_pages_and_swap_cache+0x55b/0x580 [ 905.742856] unmap_page_range+0x3228/0x3be0 [ 905.747237] unmap_single_vma+0x445/0x5e0 [ 905.751409] unmap_vmas+0x1f4/0x360 [ 905.755089] exit_mmap+0x4d7/0x980 [ 905.758674] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 905.764096] ? uprobe_clear_state+0x1b0/0x270 [ 905.768632] ? mmput+0xab/0xf0 [ 905.771879] __mmput+0x158/0x600 [ 905.775271] ? __msan_get_context_state+0x20/0xf0 [ 905.780123] mmput+0xab/0xf0 [ 905.783185] exit_mm+0x6ed/0x7a0 [ 905.786569] do_exit+0xc12/0x3930 [ 905.790054] do_group_exit+0x1a0/0x360 [ 905.793966] get_signal+0x1405/0x1ec0 [ 905.797778] ? __msan_poison_alloca+0x15c/0x1d0 [ 905.802463] ? prepare_exit_to_usermode+0x271/0x3a0 [ 905.807477] ? prepare_exit_to_usermode+0x271/0x3a0 [ 905.812489] do_signal+0xb8/0x1d20 [ 905.816053] ? kmsan_set_origin_inline+0x6b/0x120 [ 905.820897] ? __msan_poison_alloca+0x15c/0x1d0 [ 905.825581] ? syscall_return_slowpath+0xe9/0x710 [ 905.830435] ? prepare_exit_to_usermode+0x4a/0x3a0 [ 905.835362] ? syscall_return_slowpath+0xe9/0x710 [ 905.840198] ? prepare_exit_to_usermode+0xec/0x3a0 [ 905.845134] prepare_exit_to_usermode+0x271/0x3a0 [ 905.849975] syscall_return_slowpath+0xe9/0x710 [ 905.854667] ? __x64_sys_pselect6+0x1a2/0x200 [ 905.859156] do_syscall_64+0x1ad/0x230 [ 905.863065] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 905.868265] RIP: 0033:0x45d911 [ 905.871442] RSP: 002b:000000c420037f18 EFLAGS: 00000246 ORIG_RAX: 000000000000010e [ 905.879148] RAX: fffffffffffffdfe RBX: 0000000000000005 RCX: 000000000045d911 [ 905.886408] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 905.893668] RBP: 000000c420037f28 R08: 000000c420037f18 R09: 0000000000000000 [ 905.900926] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000430130 [ 905.908186] R13: 00000000000000f1 R14: 0000000000000011 R15: 0000000000000000 [ 905.915460] Code: 8b 7d d0 83 c0 ff 41 89 85 cc 08 00 00 75 48 e8 a1 6b 4a ff 4c 89 7d c0 ff 75 c0 9d 48 83 c4 20 5b 41 5c 41 5d 41 5e 41 5f 5d c3 <0f> 0b 0f 1f 84 00 00 00 00 00 eb fe 0f 0b 66 90 66 2e 0f 1f 84 [ 905.934787] RIP: kmsan_free_page+0x2a6/0x2e0 RSP: ffff8801a590ee08 [ 905.941284] ---[ end trace 7039e7bb47decad1 ]--- [ 905.946113] Kernel panic - not syncing: Fatal exception [ 905.952048] Dumping ftrace buffer: [ 905.955577] (ftrace buffer empty) [ 905.959270] Kernel Offset: disabled [ 905.962885] Rebooting in 86400 seconds..