00000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) setfsuid(0x0) 04:59:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000400)}, 0x20) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000140), 0x0) 04:59:10 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000005900)={@loopback}, &(0x7f0000005940)=0x14) 04:59:10 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) msgget$private(0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000d00), &(0x7f0000000d40)=0x14) 04:59:10 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) memfd_create(&(0x7f0000000000)='cgroup!)&(\x00', 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}) 04:59:10 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) memfd_create(&(0x7f0000000000)='cgroup!)&(\x00', 0x0) set_mempolicy(0x0, &(0x7f0000000140), 0x0) 04:59:10 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]}) getpgrp(0xffffffffffffffff) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f00000000c0)=""/114) 04:59:10 executing program 7: bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x40, &(0x7f0000000240)=""/64}, 0x48) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000140)={'ipvs\x00'}, &(0x7f0000000180)=0x1e) 04:59:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000400)}, 0x20) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000140), 0x0) 04:59:10 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) setfsuid(0x0) 04:59:10 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000005900)={@loopback}, &(0x7f0000005940)=0x14) 04:59:10 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) msgget$private(0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000d00), &(0x7f0000000d40)=0x14) 04:59:10 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) memfd_create(&(0x7f0000000000)='cgroup!)&(\x00', 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}) 04:59:10 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) set_mempolicy(0x0, &(0x7f0000000140), 0x0) 04:59:10 executing program 7: bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x40, &(0x7f0000000240)=""/64}, 0x48) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000140)={'ipvs\x00'}, &(0x7f0000000180)=0x1e) 04:59:10 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]}) getpgrp(0xffffffffffffffff) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f00000000c0)=""/114) 04:59:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000400)}, 0x20) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000140), 0x0) 04:59:10 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000005900)={@loopback}, &(0x7f0000005940)=0x14) 04:59:10 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000d00), &(0x7f0000000d40)=0x14) [ 188.815191] audit: type=1326 audit(1529729950.813:261): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12925 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:10 executing program 5: getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) setfsuid(0x0) 04:59:10 executing program 7: bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x40, &(0x7f0000000240)=""/64}, 0x48) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000140)={'ipvs\x00'}, &(0x7f0000000180)=0x1e) 04:59:10 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) memfd_create(&(0x7f0000000000)='cgroup!)&(\x00', 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}) 04:59:10 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]}) getpgrp(0xffffffffffffffff) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f00000000c0)=""/114) 04:59:11 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) set_mempolicy(0x0, &(0x7f0000000140), 0x0) 04:59:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000d00), &(0x7f0000000d40)=0x14) 04:59:11 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000005900)={@loopback}, &(0x7f0000005940)=0x14) 04:59:11 executing program 5: getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) setfsuid(0x0) 04:59:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) memfd_create(&(0x7f0000000000)='cgroup!)&(\x00', 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}) 04:59:11 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x40, &(0x7f0000000240)=""/64}, 0x48) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000140)={'ipvs\x00'}, &(0x7f0000000180)=0x1e) 04:59:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) getpgrp(0xffffffffffffffff) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f00000000c0)=""/114) [ 189.218397] audit: type=1326 audit(1529729951.217:262): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12957 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000d00), &(0x7f0000000d40)=0x14) 04:59:11 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) set_mempolicy(0x0, &(0x7f0000000140), 0x0) [ 189.305329] audit: type=1326 audit(1529729951.303:263): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12966 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000400)}, 0x20) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000140), 0x0) 04:59:11 executing program 5: getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) setfsuid(0x0) 04:59:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) memfd_create(&(0x7f0000000000)='cgroup!)&(\x00', 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}) 04:59:11 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x40, &(0x7f0000000240)=""/64}, 0x48) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000140)={'ipvs\x00'}, &(0x7f0000000180)=0x1e) 04:59:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) msgget$private(0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000d00), &(0x7f0000000d40)=0x14) 04:59:11 executing program 3: memfd_create(&(0x7f0000000000)='cgroup!)&(\x00', 0x0) set_mempolicy(0x0, &(0x7f0000000140), 0x0) 04:59:11 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) setfsuid(0x0) [ 189.744251] audit: type=1326 audit(1529729951.742:264): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12984 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:11 executing program 3: memfd_create(&(0x7f0000000000)='cgroup!)&(\x00', 0x0) set_mempolicy(0x0, &(0x7f0000000140), 0x0) [ 189.816150] audit: type=1326 audit(1529729951.790:265): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12989 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) memfd_create(&(0x7f0000000000)='cgroup!)&(\x00', 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}) 04:59:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000005900)={@loopback}, &(0x7f0000005940)=0x14) 04:59:12 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x40, &(0x7f0000000240)=""/64}, 0x48) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000140)={'ipvs\x00'}, &(0x7f0000000180)=0x1e) 04:59:12 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) setfsuid(0x0) 04:59:12 executing program 3: memfd_create(&(0x7f0000000000)='cgroup!)&(\x00', 0x0) set_mempolicy(0x0, &(0x7f0000000140), 0x0) [ 190.154914] audit: type=1326 audit(1529729952.153:266): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13016 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:12 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) memfd_create(&(0x7f0000000000)='cgroup!)&(\x00', 0x0) set_mempolicy(0x0, &(0x7f0000000140), 0x0) 04:59:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) getpgrp(0xffffffffffffffff) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f00000000c0)=""/114) 04:59:12 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) setfsuid(0x0) [ 190.316827] audit: type=1326 audit(1529729952.315:267): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13027 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000400)}, 0x20) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000140), 0x0) 04:59:12 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x40, &(0x7f0000000240)=""/64}, 0x48) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000140)={'ipvs\x00'}, &(0x7f0000000180)=0x1e) 04:59:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) memfd_create(&(0x7f0000000000)='cgroup!)&(\x00', 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}) 04:59:12 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) memfd_create(&(0x7f0000000000)='cgroup!)&(\x00', 0x0) set_mempolicy(0x0, &(0x7f0000000140), 0x0) 04:59:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) msgget$private(0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000d00), &(0x7f0000000d40)=0x14) 04:59:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) setfsuid(0x0) 04:59:12 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x40, &(0x7f0000000240)=""/64}, 0x48) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000140)={'ipvs\x00'}, &(0x7f0000000180)=0x1e) [ 190.724287] audit: type=1326 audit(1529729952.722:268): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13040 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:12 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) memfd_create(&(0x7f0000000000)='cgroup!)&(\x00', 0x0) set_mempolicy(0x0, &(0x7f0000000140), 0x0) 04:59:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) memfd_create(&(0x7f0000000000)='cgroup!)&(\x00', 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}) [ 190.786709] audit: type=1326 audit(1529729952.782:269): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13045 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000005900)={@loopback}, &(0x7f0000005940)=0x14) 04:59:13 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) setfsuid(0x0) 04:59:13 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) memfd_create(&(0x7f0000000000)='cgroup!)&(\x00', 0x0) set_mempolicy(0x0, &(0x7f0000000140), 0x0) 04:59:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) memfd_create(&(0x7f0000000000)='cgroup!)&(\x00', 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}) 04:59:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x40, &(0x7f0000000240)=""/64}, 0x48) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000140)={'ipvs\x00'}, &(0x7f0000000180)=0x1e) 04:59:13 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) getpgrp(0xffffffffffffffff) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f00000000c0)=""/114) 04:59:13 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) setfsuid(0x0) 04:59:13 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) setfsuid(0x0) 04:59:13 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) memfd_create(&(0x7f0000000000)='cgroup!)&(\x00', 0x0) set_mempolicy(0x0, &(0x7f0000000140), 0x0) 04:59:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x40, &(0x7f0000000240)=""/64}, 0x48) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000140)={'ipvs\x00'}, &(0x7f0000000180)=0x1e) 04:59:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) memfd_create(&(0x7f0000000000)='cgroup!)&(\x00', 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}) [ 191.669619] kauditd_printk_skb: 2 callbacks suppressed [ 191.669643] audit: type=1326 audit(1529729953.668:272): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13091 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) msgget$private(0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000d00), &(0x7f0000000d40)=0x14) 04:59:13 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) memfd_create(&(0x7f0000000000)='cgroup!)&(\x00', 0x0) set_mempolicy(0x0, &(0x7f0000000140), 0x0) 04:59:13 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) setfsuid(0x0) 04:59:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x40, &(0x7f0000000240)=""/64}, 0x48) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000140)={'ipvs\x00'}, &(0x7f0000000180)=0x1e) [ 191.776171] audit: type=1326 audit(1529729953.774:273): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13098 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:13 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) memfd_create(&(0x7f0000000000)='cgroup!)&(\x00', 0x0) set_mempolicy(0x0, &(0x7f0000000140), 0x0) 04:59:14 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) setfsuid(0x0) 04:59:14 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x40, &(0x7f0000000240)=""/64}, 0x48) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000140)={'ipvs\x00'}, &(0x7f0000000180)=0x1e) 04:59:14 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) memfd_create(&(0x7f0000000000)='cgroup!)&(\x00', 0x0) set_mempolicy(0x0, &(0x7f0000000140), 0x0) 04:59:14 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) memfd_create(&(0x7f0000000000)='cgroup!)&(\x00', 0x0) set_mempolicy(0x0, &(0x7f0000000140), 0x0) 04:59:14 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) setfsuid(0x0) [ 192.139947] audit: type=1326 audit(1529729954.135:274): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13123 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:14 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) memfd_create(&(0x7f0000000000)='cgroup!)&(\x00', 0x0) set_mempolicy(0x0, &(0x7f0000000140), 0x0) 04:59:14 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x40, &(0x7f0000000240)=""/64}, 0x48) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000140)={'ipvs\x00'}, &(0x7f0000000180)=0x1e) [ 192.227373] audit: type=1326 audit(1529729954.226:275): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13129 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 192.251249] audit: type=1326 audit(1529729954.248:276): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13130 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:14 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) memfd_create(&(0x7f0000000000)='cgroup!)&(\x00', 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}) [ 192.590311] audit: type=1326 audit(1529729954.589:277): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13137 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:15 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) setfsuid(0x0) [ 193.063372] audit: type=1326 audit(1529729955.062:278): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13144 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:15 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x40, &(0x7f0000000240)=""/64}, 0x48) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000140)={'ipvs\x00'}, &(0x7f0000000180)=0x1e) 04:59:15 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) memfd_create(&(0x7f0000000000)='cgroup!)&(\x00', 0x0) set_mempolicy(0x0, &(0x7f0000000140), 0x0) [ 193.160490] audit: type=1326 audit(1529729955.159:279): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13147 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 193.198104] audit: type=1326 audit(1529729955.196:280): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13150 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:15 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) memfd_create(&(0x7f0000000000)='cgroup!)&(\x00', 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}) [ 193.530034] audit: type=1326 audit(1529729955.528:281): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13154 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={{0x0, 0x7530}, {0x0, 0x7530}}) 04:59:15 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, @dev}, &(0x7f0000000080)=0x10, 0x0) set_thread_area(&(0x7f0000000340)) 04:59:15 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000240)) 04:59:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, "04fd56fb23a444a734fd62a172c89dd5b6fd816a9ff489adec6191003a56a15e"}) 04:59:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, "04fd56fb23a444a734fd62a172c89dd5b6fd816a9ff489adec6191003a56a15e"}) 04:59:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={{0x0, 0x7530}, {0x0, 0x7530}}) 04:59:15 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) perf_event_open(&(0x7f00000050c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) 04:59:15 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, @loopback}, &(0x7f0000000080)=0x10, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100), 0x0) 04:59:16 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) setfsuid(0x0) 04:59:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={{0x0, 0x7530}, {0x0, 0x7530}}) 04:59:16 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x40, &(0x7f0000000240)=""/64}, 0x48) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000140)={'ipvs\x00'}, &(0x7f0000000180)=0x1e) 04:59:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) perf_event_open(&(0x7f00000050c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) 04:59:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, "04fd56fb23a444a734fd62a172c89dd5b6fd816a9ff489adec6191003a56a15e"}) 04:59:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) memfd_create(&(0x7f0000000000)='cgroup!)&(\x00', 0x0) set_mempolicy(0x0, &(0x7f0000000140), 0x0) 04:59:16 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, @loopback}, &(0x7f0000000080)=0x10, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100), 0x0) 04:59:16 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, @loopback}, &(0x7f0000000080)=0x10, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100), 0x0) 04:59:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={{0x0, 0x7530}, {0x0, 0x7530}}) 04:59:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) perf_event_open(&(0x7f00000050c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) 04:59:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, "04fd56fb23a444a734fd62a172c89dd5b6fd816a9ff489adec6191003a56a15e"}) 04:59:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000180)={@local={0xfe, 0x80, [], 0xaa}}, 0x14) 04:59:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={{0x0, 0x7530}, {0x0, 0x7530}}) 04:59:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, "04fd56fb23a444a734fd62a172c89dd5b6fd816a9ff489adec6191003a56a15e"}) 04:59:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000180)={@local={0xfe, 0x80, [], 0xaa}}, 0x14) 04:59:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) perf_event_open(&(0x7f00000050c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) 04:59:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000180)={@local={0xfe, 0x80, [], 0xaa}}, 0x14) 04:59:16 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, @loopback}, &(0x7f0000000080)=0x10, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100), 0x0) 04:59:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000180)={@local={0xfe, 0x80, [], 0xaa}}, 0x14) 04:59:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, "04fd56fb23a444a734fd62a172c89dd5b6fd816a9ff489adec6191003a56a15e"}) 04:59:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={{0x0, 0x7530}, {0x0, 0x7530}}) 04:59:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000180)={@local={0xfe, 0x80, [], 0xaa}}, 0x14) 04:59:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) perf_event_open(&(0x7f00000050c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) 04:59:17 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000040)) 04:59:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100), 0x0) 04:59:17 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000180)=""/126, 0x7e, 0x0, 0x0) 04:59:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={{0x0, 0x7530}, {0x0, 0x7530}}) 04:59:17 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) 04:59:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, "04fd56fb23a444a734fd62a172c89dd5b6fd816a9ff489adec6191003a56a15e"}) 04:59:17 executing program 2: getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={{0x0, 0x7530}, {0x0, 0x7530}}) 04:59:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) perf_event_open(&(0x7f00000050c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) 04:59:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100), 0x0) 04:59:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000180)={@local={0xfe, 0x80, [], 0xaa}}, 0x14) 04:59:17 executing program 1: openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, "04fd56fb23a444a734fd62a172c89dd5b6fd816a9ff489adec6191003a56a15e"}) 04:59:17 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000040)) 04:59:17 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) 04:59:17 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) 04:59:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) perf_event_open(&(0x7f00000050c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) 04:59:17 executing program 2: getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={{0x0, 0x7530}, {0x0, 0x7530}}) 04:59:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000180)={@local={0xfe, 0x80, [], 0xaa}}, 0x14) 04:59:17 executing program 1: openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, "04fd56fb23a444a734fd62a172c89dd5b6fd816a9ff489adec6191003a56a15e"}) 04:59:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100), 0x0) 04:59:17 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000040)) 04:59:17 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) perf_event_open(&(0x7f00000050c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) 04:59:17 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) 04:59:17 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) 04:59:17 executing program 2: getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={{0x0, 0x7530}, {0x0, 0x7530}}) 04:59:18 executing program 1: openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, "04fd56fb23a444a734fd62a172c89dd5b6fd816a9ff489adec6191003a56a15e"}) 04:59:18 executing program 6: msgget$private(0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000180)={@local={0xfe, 0x80, [], 0xaa}}, 0x14) 04:59:18 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={{0x0, 0x7530}, {0x0, 0x7530}}) 04:59:18 executing program 0: accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, @loopback}, &(0x7f0000000080)=0x10, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100), 0x0) 04:59:18 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) perf_event_open(&(0x7f00000050c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) 04:59:18 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) 04:59:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) 04:59:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000040)) 04:59:18 executing program 6: msgget$private(0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000180)={@local={0xfe, 0x80, [], 0xaa}}, 0x14) 04:59:18 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, "04fd56fb23a444a734fd62a172c89dd5b6fd816a9ff489adec6191003a56a15e"}) 04:59:18 executing program 0: accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, @loopback}, &(0x7f0000000080)=0x10, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100), 0x0) 04:59:18 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={{0x0, 0x7530}, {0x0, 0x7530}}) 04:59:18 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) perf_event_open(&(0x7f00000050c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) 04:59:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) 04:59:18 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, "04fd56fb23a444a734fd62a172c89dd5b6fd816a9ff489adec6191003a56a15e"}) 04:59:18 executing program 6: msgget$private(0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000180)={@local={0xfe, 0x80, [], 0xaa}}, 0x14) 04:59:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000040)) 04:59:18 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) 04:59:18 executing program 0: accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, @loopback}, &(0x7f0000000080)=0x10, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100), 0x0) 04:59:18 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={{0x0, 0x7530}, {0x0, 0x7530}}) 04:59:18 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) perf_event_open(&(0x7f00000050c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) 04:59:18 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000180)={@local={0xfe, 0x80, [], 0xaa}}, 0x14) 04:59:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) 04:59:18 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, "04fd56fb23a444a734fd62a172c89dd5b6fd816a9ff489adec6191003a56a15e"}) 04:59:18 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) 04:59:18 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, @loopback}, &(0x7f0000000080)=0x10, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100), 0x0) 04:59:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000040)) 04:59:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={{0x0, 0x7530}, {0x0, 0x7530}}) 04:59:18 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000180)={@local={0xfe, 0x80, [], 0xaa}}, 0x14) 04:59:18 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) perf_event_open(&(0x7f00000050c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) 04:59:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, "04fd56fb23a444a734fd62a172c89dd5b6fd816a9ff489adec6191003a56a15e"}) 04:59:19 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) 04:59:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={{0x0, 0x7530}, {0x0, 0x7530}}) 04:59:19 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, @loopback}, &(0x7f0000000080)=0x10, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100), 0x0) 04:59:19 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) perf_event_open(&(0x7f00000050c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) 04:59:19 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) 04:59:19 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000040)) 04:59:19 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000180)={@local={0xfe, 0x80, [], 0xaa}}, 0x14) 04:59:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, "04fd56fb23a444a734fd62a172c89dd5b6fd816a9ff489adec6191003a56a15e"}) 04:59:19 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) 04:59:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={{0x0, 0x7530}, {0x0, 0x7530}}) 04:59:19 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, @loopback}, &(0x7f0000000080)=0x10, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100), 0x0) 04:59:19 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) msgget$private(0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000180)={@local={0xfe, 0x80, [], 0xaa}}, 0x14) 04:59:19 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) perf_event_open(&(0x7f00000050c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) 04:59:19 executing program 3: openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) 04:59:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, "04fd56fb23a444a734fd62a172c89dd5b6fd816a9ff489adec6191003a56a15e"}) 04:59:19 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000040)) 04:59:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={{0x0, 0x7530}, {0x0, 0x7530}}) 04:59:19 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, @loopback}, &(0x7f0000000080)=0x10, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100), 0x0) 04:59:19 executing program 7: creat(&(0x7f00000000c0)='./file0\x00', 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) 04:59:19 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) msgget$private(0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000180)={@local={0xfe, 0x80, [], 0xaa}}, 0x14) 04:59:19 executing program 3: openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) 04:59:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, "04fd56fb23a444a734fd62a172c89dd5b6fd816a9ff489adec6191003a56a15e"}) 04:59:19 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) perf_event_open(&(0x7f00000050c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) 04:59:19 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000040)) 04:59:19 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, @loopback}, &(0x7f0000000080)=0x10, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100), 0x0) 04:59:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={{0x0, 0x7530}, {0x0, 0x7530}}) 04:59:19 executing program 7: creat(&(0x7f00000000c0)='./file0\x00', 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) 04:59:19 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) msgget$private(0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000180)={@local={0xfe, 0x80, [], 0xaa}}, 0x14) 04:59:19 executing program 3: openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) 04:59:19 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) perf_event_open(&(0x7f00000050c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) 04:59:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, "04fd56fb23a444a734fd62a172c89dd5b6fd816a9ff489adec6191003a56a15e"}) 04:59:20 executing program 7: creat(&(0x7f00000000c0)='./file0\x00', 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) 04:59:20 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000040)) 04:59:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, @loopback}, &(0x7f0000000080)=0x10, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100), 0x0) 04:59:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={{0x0, 0x7530}, {0x0, 0x7530}}) 04:59:20 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) 04:59:20 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000180)={@local={0xfe, 0x80, [], 0xaa}}, 0x14) 04:59:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) perf_event_open(&(0x7f00000050c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) 04:59:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, "04fd56fb23a444a734fd62a172c89dd5b6fd816a9ff489adec6191003a56a15e"}) 04:59:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, @loopback}, &(0x7f0000000080)=0x10, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100), 0x0) 04:59:20 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000040)) 04:59:20 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) 04:59:20 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000180)={@local={0xfe, 0x80, [], 0xaa}}, 0x14) 04:59:20 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) 04:59:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={{0x0, 0x7530}, {0x0, 0x7530}}) 04:59:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, "04fd56fb23a444a734fd62a172c89dd5b6fd816a9ff489adec6191003a56a15e"}) 04:59:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) perf_event_open(&(0x7f00000050c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) 04:59:20 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000040)) [ 198.505709] kauditd_printk_skb: 3 callbacks suppressed [ 198.505731] audit: type=1326 audit(1529729960.504:285): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13559 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, @loopback}, &(0x7f0000000080)=0x10, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100), 0x0) 04:59:20 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) 04:59:20 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) 04:59:20 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000180)={@local={0xfe, 0x80, [], 0xaa}}, 0x14) [ 198.602095] audit: type=1326 audit(1529729960.533:286): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13563 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) perf_event_open(&(0x7f00000050c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) 04:59:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) 04:59:20 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000040)) 04:59:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, @loopback}, &(0x7f0000000080)=0x10, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100), 0x0) 04:59:20 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) msgget$private(0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000180)={@local={0xfe, 0x80, [], 0xaa}}, 0x14) 04:59:20 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) 04:59:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) perf_event_open(&(0x7f00000050c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) 04:59:20 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) [ 198.907576] audit: type=1326 audit(1529729960.906:287): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13596 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 198.993816] audit: type=1326 audit(1529729960.981:288): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13601 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={{0x0, 0x7530}, {0x0, 0x7530}}) 04:59:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) 04:59:21 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, @loopback}, &(0x7f0000000080)=0x10, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100), 0x0) 04:59:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000040)) 04:59:21 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) 04:59:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, "04fd56fb23a444a734fd62a172c89dd5b6fd816a9ff489adec6191003a56a15e"}) [ 199.448041] audit: type=1326 audit(1529729961.445:289): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13615 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000040)) 04:59:21 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) 04:59:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) [ 199.499476] audit: type=1326 audit(1529729961.467:290): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13613 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 199.519233] audit: type=1326 audit(1529729961.497:291): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13622 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:21 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) 04:59:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000040)) 04:59:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505a7}]}) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) 04:59:21 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) msgget$private(0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000180)={@local={0xfe, 0x80, [], 0xaa}}, 0x14) 04:59:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000040)) 04:59:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) perf_event_open(&(0x7f00000050c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) 04:59:21 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) [ 199.877404] audit: type=1326 audit(1529729961.876:292): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13652 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 199.962642] audit: type=1326 audit(1529729961.960:293): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13658 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={{0x0, 0x7530}, {0x0, 0x7530}}) 04:59:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505a7}]}) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) 04:59:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000040)) 04:59:22 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) 04:59:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, "04fd56fb23a444a734fd62a172c89dd5b6fd816a9ff489adec6191003a56a15e"}) 04:59:22 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, @loopback}, &(0x7f0000000080)=0x10, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100), 0x0) [ 200.439966] audit: type=1326 audit(1529729962.438:294): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13671 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000040)) 04:59:22 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) 04:59:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505a7}]}) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) 04:59:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000040)) 04:59:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) 04:59:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) msgget$private(0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000180)={@local={0xfe, 0x80, [], 0xaa}}, 0x14) 04:59:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) perf_event_open(&(0x7f00000050c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) 04:59:23 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, @loopback}, &(0x7f0000000080)=0x10, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100), 0x0) 04:59:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) clock_gettime(0x0, &(0x7f0000000140)) move_pages(0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000000380), 0x0) 04:59:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) 04:59:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) 04:59:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0xffffffffffffff9c}, 0x20) epoll_wait(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0) 04:59:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) 04:59:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000040)) 04:59:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) 04:59:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f000000a240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f000000a280)=0x14) 04:59:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0xffffffffffffff9c}, 0x20) epoll_wait(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0) 04:59:23 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) getpgid(0xffffffffffffffff) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000100)) 04:59:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) 04:59:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0xffffffffffffff9c}, 0x20) epoll_wait(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0) 04:59:24 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f000000a240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f000000a280)=0x14) 04:59:24 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) getpgid(0xffffffffffffffff) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000100)) 04:59:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) 04:59:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) 04:59:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0xffffffffffffff9c}, 0x20) epoll_wait(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0) 04:59:24 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f000000a240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f000000a280)=0x14) 04:59:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) 04:59:24 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) getpgid(0xffffffffffffffff) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000100)) 04:59:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) 04:59:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000040)) 04:59:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f0000000140)) 04:59:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) 04:59:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) epoll_wait(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0) 04:59:24 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f000000a240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f000000a280)=0x14) 04:59:24 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) getpgid(0xffffffffffffffff) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000100)) 04:59:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) 04:59:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) epoll_wait(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0) 04:59:24 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) getsockname$packet(0xffffffffffffffff, &(0x7f000000a240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f000000a280)=0x14) 04:59:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f0000000140)) 04:59:24 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000100)) 04:59:24 executing program 2: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) 04:59:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) epoll_wait(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0) 04:59:25 executing program 1: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0xffffffffffffff9c}, 0x20) epoll_wait(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0) 04:59:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000100)) 04:59:25 executing program 2: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) 04:59:25 executing program 2: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) 04:59:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000100)) 04:59:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000180)) 04:59:25 executing program 1: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0xffffffffffffff9c}, 0x20) epoll_wait(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0) 04:59:25 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) getsockname$packet(0xffffffffffffffff, &(0x7f000000a240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f000000a280)=0x14) 04:59:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f0000000140)) 04:59:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000100)) 04:59:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) syz_open_dev$urandom(&(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) 04:59:25 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) 04:59:25 executing program 1: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0xffffffffffffff9c}, 0x20) epoll_wait(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0) 04:59:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000100)) 04:59:25 executing program 4: getpgid(0xffffffffffffffff) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000100)) 04:59:25 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) getsockname$packet(0xffffffffffffffff, &(0x7f000000a240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f000000a280)=0x14) 04:59:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f0000000140)) 04:59:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000180)) 04:59:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) syz_open_dev$urandom(&(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) 04:59:25 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0xffffffffffffff9c}, 0x20) epoll_wait(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0) 04:59:25 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) 04:59:26 executing program 4: getpgid(0xffffffffffffffff) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000100)) 04:59:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000100)) 04:59:26 executing program 6: socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f000000a240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f000000a280)=0x14) 04:59:26 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f0000000140)) 04:59:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000180)) 04:59:26 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) 04:59:26 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0xffffffffffffff9c}, 0x20) epoll_wait(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0) 04:59:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) syz_open_dev$urandom(&(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) 04:59:26 executing program 4: getpgid(0xffffffffffffffff) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000100)) 04:59:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000100)) 04:59:26 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f0000000140)) 04:59:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) 04:59:26 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0xffffffffffffff9c}, 0x20) epoll_wait(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0) 04:59:26 executing program 6: socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f000000a240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f000000a280)=0x14) 04:59:26 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) getpgid(0xffffffffffffffff) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000100)) 04:59:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) syz_open_dev$urandom(&(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) 04:59:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000180)) 04:59:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) 04:59:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0xffffffffffffff9c}, 0x20) epoll_wait(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0) 04:59:26 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f0000000140)) 04:59:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000100)) 04:59:26 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) getpgid(0xffffffffffffffff) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000100)) 04:59:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) 04:59:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000180)) 04:59:26 executing program 6: socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f000000a240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f000000a280)=0x14) 04:59:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) 04:59:26 executing program 0: semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f0000000140)) 04:59:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0xffffffffffffff9c}, 0x20) epoll_wait(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0) 04:59:26 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) getpgid(0xffffffffffffffff) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000100)) 04:59:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000100)) 04:59:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000180)) 04:59:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) 04:59:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) 04:59:27 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f000000a240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f000000a280)=0x14) 04:59:27 executing program 0: semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f0000000140)) 04:59:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000100)) 04:59:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)) getpgid(0xffffffffffffffff) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000100)) 04:59:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0xffffffffffffff9c}, 0x20) epoll_wait(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0) 04:59:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000180)) 04:59:27 executing program 0: semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f0000000140)) 04:59:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) 04:59:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) 04:59:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)) getpgid(0xffffffffffffffff) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000100)) 04:59:27 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f000000a240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f000000a280)=0x14) 04:59:27 executing program 3: creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000100)) 04:59:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50030}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0xffffffffffffff9c}, 0x20) epoll_wait(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0) 04:59:27 executing program 7: msgget$private(0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000180)) 04:59:27 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f0000000140)) 04:59:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) 04:59:27 executing program 3: creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000100)) 04:59:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)) getpgid(0xffffffffffffffff) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000100)) 04:59:27 executing program 5: syz_open_dev$urandom(&(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) 04:59:27 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f000000a240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f000000a280)=0x14) 04:59:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50030}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0xffffffffffffff9c}, 0x20) epoll_wait(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0) 04:59:27 executing program 7: msgget$private(0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000180)) 04:59:27 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f0000000140)) 04:59:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505a7}]}) getpgid(0xffffffffffffffff) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000100)) 04:59:27 executing program 3: creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000100)) 04:59:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) 04:59:28 executing program 5: syz_open_dev$urandom(&(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) 04:59:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50030}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0xffffffffffffff9c}, 0x20) epoll_wait(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0) 04:59:28 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f0000000140)) 04:59:28 executing program 7: msgget$private(0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000180)) [ 206.105791] kauditd_printk_skb: 14 callbacks suppressed [ 206.105814] audit: type=1326 audit(1529729968.104:309): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14080 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505a7}]}) getpgid(0xffffffffffffffff) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000100)) 04:59:28 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f000000a240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f000000a280)=0x14) 04:59:28 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000100)) 04:59:28 executing program 5: syz_open_dev$urandom(&(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) 04:59:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0xffffffffffffff9c}, 0x20) epoll_wait(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0) 04:59:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f0000000140)) 04:59:28 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000180)) 04:59:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505a7}]}) getpgid(0xffffffffffffffff) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000100)) [ 206.383743] audit: type=1326 audit(1529729968.382:310): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14107 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:28 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000100)) 04:59:28 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) syz_open_dev$urandom(&(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) 04:59:28 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f000000a240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f000000a280)=0x14) 04:59:28 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000180)) 04:59:28 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f000000a240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f000000a280)=0x14) 04:59:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f0000000140)) 04:59:28 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) syz_open_dev$urandom(&(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) 04:59:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) getpgid(0xffffffffffffffff) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000100)) 04:59:28 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000100)) 04:59:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) [ 207.046580] audit: type=1326 audit(1529729969.041:311): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14138 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000100)) 04:59:29 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000180)) [ 207.107733] audit: type=1326 audit(1529729969.066:312): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14144 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:29 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) syz_open_dev$urandom(&(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) 04:59:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0xffffffffffffff9c}, 0x20) epoll_wait(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0) 04:59:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f0000000140)) 04:59:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502a9}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f000000a240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f000000a280)=0x14) 04:59:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000100)) 04:59:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) msgget$private(0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000180)) 04:59:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) syz_open_dev$urandom(&(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) 04:59:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f0000000140)) [ 207.370601] audit: type=1326 audit(1529729969.367:313): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14178 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) msgget$private(0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000180)) 04:59:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f0000000140)) 04:59:29 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) 04:59:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) syz_open_dev$urandom(&(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) 04:59:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) getpgid(0xffffffffffffffff) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000100)) 04:59:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000100)) 04:59:30 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502a9}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f000000a240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f000000a280)=0x14) 04:59:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) msgget$private(0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000180)) 04:59:30 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f0000000140)) [ 207.983136] audit: type=1326 audit(1529729969.981:314): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14201 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 208.120577] audit: type=1326 audit(1529729970.119:315): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14215 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000180)) 04:59:30 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502a9}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f000000a240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f000000a280)=0x14) 04:59:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) syz_open_dev$urandom(&(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) 04:59:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000100)) 04:59:30 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0xffffffffffffff9c}, 0x20) epoll_wait(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0) 04:59:30 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f0000000140)) 04:59:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000180)) [ 208.314756] audit: type=1326 audit(1529729970.313:316): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14227 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000100)) [ 208.382624] audit: type=1326 audit(1529729970.368:317): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14236 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000180)) 04:59:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) syz_open_dev$urandom(&(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) 04:59:30 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f000000a240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f000000a280)=0x14) [ 208.918783] audit: type=1326 audit(1529729970.917:318): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14251 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) getpgid(0xffffffffffffffff) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000100)) 04:59:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000100)) 04:59:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6, 0x0, 0x0, 0x50344}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000001c0)) socket$alg(0x26, 0x5, 0x0) 04:59:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) msgget$private(0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000180)) 04:59:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) syz_open_dev$urandom(&(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) 04:59:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000100)) 04:59:31 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f0000000140)) 04:59:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) syz_open_dev$urandom(&(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) 04:59:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6, 0x0, 0x0, 0x50344}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000001c0)) socket$alg(0x26, 0x5, 0x0) 04:59:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) accept4(0xffffffffffffffff, &(0x7f0000006100)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000006180)=0x80, 0x0) 04:59:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_dev$urandom(&(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) 04:59:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) accept4(0xffffffffffffffff, &(0x7f0000006100)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000006180)=0x80, 0x0) 04:59:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6, 0x0, 0x0, 0x50344}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000001c0)) socket$alg(0x26, 0x5, 0x0) 04:59:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) accept4(0xffffffffffffffff, &(0x7f0000006100)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000006180)=0x80, 0x0) 04:59:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6, 0x0, 0x0, 0x50344}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000001c0)) socket$alg(0x26, 0x5, 0x0) 04:59:31 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f000000a240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f000000a280)=0x14) 04:59:32 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) msgget$private(0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000180)) 04:59:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) accept4(0xffffffffffffffff, &(0x7f0000006100)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000006180)=0x80, 0x0) 04:59:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6, 0x0, 0x0, 0x50344}]}) socket$alg(0x26, 0x5, 0x0) 04:59:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) 04:59:32 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000100)) 04:59:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) 04:59:32 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f0000000140)) 04:59:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6, 0x0, 0x0, 0x50344}]}) socket$alg(0x26, 0x5, 0x0) 04:59:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) accept4(0xffffffffffffffff, &(0x7f0000006100)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000006180)=0x80, 0x0) 04:59:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_dev$urandom(&(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) 04:59:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) 04:59:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) accept4(0xffffffffffffffff, &(0x7f0000006100)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000006180)=0x80, 0x0) 04:59:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6, 0x0, 0x0, 0x50344}]}) socket$alg(0x26, 0x5, 0x0) 04:59:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) accept4(0xffffffffffffffff, &(0x7f0000006100)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000006180)=0x80, 0x0) 04:59:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) 04:59:32 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f000000a240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f000000a280)=0x14) 04:59:32 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) msgget$private(0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000180)) 04:59:32 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000001c0)) socket$alg(0x26, 0x5, 0x0) 04:59:32 executing program 1: creat(&(0x7f00000000c0)='./file0\x00', 0x0) accept4(0xffffffffffffffff, &(0x7f0000006100)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000006180)=0x80, 0x0) 04:59:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) 04:59:33 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000100)) 04:59:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) [ 211.139596] kauditd_printk_skb: 12 callbacks suppressed [ 211.139617] audit: type=1326 audit(1529729973.138:331): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14383 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) 04:59:33 executing program 1: creat(&(0x7f00000000c0)='./file0\x00', 0x0) accept4(0xffffffffffffffff, &(0x7f0000006100)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000006180)=0x80, 0x0) 04:59:33 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000001c0)) socket$alg(0x26, 0x5, 0x0) 04:59:33 executing program 1: creat(&(0x7f00000000c0)='./file0\x00', 0x0) accept4(0xffffffffffffffff, &(0x7f0000006100)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000006180)=0x80, 0x0) 04:59:33 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_dev$urandom(&(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) 04:59:33 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000001c0)) socket$alg(0x26, 0x5, 0x0) 04:59:33 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000100)) 04:59:33 executing program 4: msgget$private(0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) 04:59:33 executing program 4: msgget$private(0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) [ 211.411365] audit: type=1326 audit(1529729973.410:332): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14405 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:33 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000100)) 04:59:33 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000100)) 04:59:33 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) accept4(0xffffffffffffffff, &(0x7f0000006100)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000006180)=0x80, 0x0) 04:59:33 executing program 4: msgget$private(0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) 04:59:33 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6, 0x0, 0x0, 0x50344}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000001c0)) socket$alg(0x26, 0x5, 0x0) 04:59:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000100)) 04:59:34 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000280)) 04:59:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 04:59:34 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) 04:59:34 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6, 0x0, 0x0, 0x50344}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000001c0)) socket$alg(0x26, 0x5, 0x0) 04:59:34 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) accept4(0xffffffffffffffff, &(0x7f0000006100)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000006180)=0x80, 0x0) 04:59:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 04:59:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) 04:59:34 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6, 0x0, 0x0, 0x50344}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000001c0)) socket$alg(0x26, 0x5, 0x0) 04:59:34 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) 04:59:34 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) accept4(0xffffffffffffffff, &(0x7f0000006100)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000006180)=0x80, 0x0) 04:59:34 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000280)) 04:59:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000100)) 04:59:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) getpgid(0xffffffffffffffff) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f0000000200)) 04:59:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) accept4(0xffffffffffffffff, &(0x7f0000006100)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000006180)=0x80, 0x0) 04:59:34 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000600)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000001c0)) socket$alg(0x26, 0x5, 0x0) 04:59:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000100)) 04:59:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) 04:59:34 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000280)) 04:59:34 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) 04:59:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 04:59:34 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000600)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000001c0)) socket$alg(0x26, 0x5, 0x0) 04:59:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) accept4(0xffffffffffffffff, &(0x7f0000006100)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000006180)=0x80, 0x0) 04:59:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) getpgid(0xffffffffffffffff) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f0000000200)) 04:59:34 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) msgget$private(0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) 04:59:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000100)) 04:59:34 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000280)) 04:59:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) 04:59:34 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000600)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000001c0)) socket$alg(0x26, 0x5, 0x0) 04:59:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) accept4(0xffffffffffffffff, &(0x7f0000006100)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000006180)=0x80, 0x0) 04:59:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 04:59:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) msgget$private(0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) 04:59:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) getpgid(0xffffffffffffffff) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f0000000200)) 04:59:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x0, 0x0, 0x0, 0x50344}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000001c0)) socket$alg(0x26, 0x5, 0x0) 04:59:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000280)) 04:59:35 executing program 0: getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000100)) 04:59:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) 04:59:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) accept4(0xffffffffffffffff, &(0x7f0000006100)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000006180)=0x80, 0x0) 04:59:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) ioprio_set$pid(0x0, 0x0, 0x0) 04:59:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) msgget$private(0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) 04:59:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x0, 0x0, 0x0, 0x50344}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000001c0)) socket$alg(0x26, 0x5, 0x0) 04:59:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) getpgid(0xffffffffffffffff) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f0000000200)) 04:59:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000280)) 04:59:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) accept4(0xffffffffffffffff, &(0x7f0000006100)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000006180)=0x80, 0x0) 04:59:35 executing program 0: getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000100)) 04:59:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) inotify_rm_watch(0xffffffffffffffff, 0x0) 04:59:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) 04:59:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x0, 0x0, 0x0, 0x50344}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000001c0)) socket$alg(0x26, 0x5, 0x0) 04:59:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) ioprio_set$pid(0x0, 0x0, 0x0) 04:59:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f0000000200)) 04:59:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) accept4(0xffffffffffffffff, &(0x7f0000006100)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000006180)=0x80, 0x0) 04:59:35 executing program 0: getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000100)) 04:59:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000280)) 04:59:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) 04:59:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000001c0)) socket$alg(0x26, 0x5, 0x0) [ 213.772645] audit: type=1326 audit(1529729975.771:333): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14594 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) ioprio_set$pid(0x0, 0x0, 0x0) 04:59:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) inotify_rm_watch(0xffffffffffffffff, 0x0) 04:59:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f0000000200)) 04:59:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) accept4(0xffffffffffffffff, &(0x7f0000006100)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000006180)=0x80, 0x0) 04:59:35 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000100)) 04:59:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) [ 213.963317] audit: type=1326 audit(1529729975.961:334): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14607 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) inotify_rm_watch(0xffffffffffffffff, 0x0) 04:59:36 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000280)) 04:59:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f0000000200)) 04:59:36 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000100)) 04:59:36 executing program 7: openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 04:59:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) msgget$private(0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) 04:59:36 executing program 3: msgget$private(0x0, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) 04:59:36 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000280)) 04:59:36 executing program 5: getpgid(0xffffffffffffffff) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f0000000200)) [ 214.298482] audit: type=1326 audit(1529729976.297:335): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14632 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000001c0)) socket$alg(0x26, 0x5, 0x0) 04:59:36 executing program 7: openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 04:59:36 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000100)) 04:59:36 executing program 3: msgget$private(0x0, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) [ 214.726574] audit: type=1326 audit(1529729976.725:336): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14655 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) accept4(0xffffffffffffffff, &(0x7f0000006100)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000006180)=0x80, 0x0) 04:59:36 executing program 5: getpgid(0xffffffffffffffff) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f0000000200)) 04:59:36 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000280)) 04:59:36 executing program 3: msgget$private(0x0, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) 04:59:36 executing program 7: openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 04:59:36 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000240)}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000100)) 04:59:36 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) [ 214.925909] audit: type=1326 audit(1529729976.924:337): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14673 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:36 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) 04:59:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) msgget$private(0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) 04:59:37 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000240)}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000100)) 04:59:37 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000280)) 04:59:37 executing program 5: getpgid(0xffffffffffffffff) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f0000000200)) [ 215.241141] audit: type=1326 audit(1529729977.239:338): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14694 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000001c0)) socket$alg(0x26, 0x5, 0x0) 04:59:37 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 04:59:37 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) 04:59:37 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) getpgid(0xffffffffffffffff) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f0000000200)) [ 215.646207] audit: type=1326 audit(1529729977.644:339): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14700 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:37 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) accept4(0xffffffffffffffff, &(0x7f0000006100)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000006180)=0x80, 0x0) 04:59:37 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000240)}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000100)) 04:59:37 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000280)) 04:59:37 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 04:59:37 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) 04:59:37 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) getpgid(0xffffffffffffffff) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f0000000200)) 04:59:37 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) getpgid(0xffffffffffffffff) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f0000000200)) 04:59:37 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000280)) [ 215.906184] audit: type=1326 audit(1529729977.904:340): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14722 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:38 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) msgget$private(0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) 04:59:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 04:59:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) msgget$private(0x0, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) 04:59:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000100)) [ 216.196896] audit: type=1326 audit(1529729978.195:341): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14744 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000280)) 04:59:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)) getpgid(0xffffffffffffffff) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f0000000200)) 04:59:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000100)) 04:59:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 04:59:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)) getpgid(0xffffffffffffffff) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f0000000200)) 04:59:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) msgget$private(0x0, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) 04:59:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000300), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002340)={0xffffffff}, 0xc) 04:59:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000100)) 04:59:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 04:59:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000280)) 04:59:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) keyctl$revoke(0x3, 0x0) 04:59:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000280)) 04:59:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) keyctl$revoke(0x3, 0x0) 04:59:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000240)=[{0x6}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000100)) 04:59:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) msgget$private(0x0, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) 04:59:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505a7}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 04:59:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)) getpgid(0xffffffffffffffff) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f0000000200)) 04:59:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[]}, 0x1}, 0x0) 04:59:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505a7}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000280)) 04:59:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) socket$alg(0x26, 0x5, 0x0) [ 217.155453] audit: type=1326 audit(1529729979.154:342): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14803 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505a7}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000280)) 04:59:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) 04:59:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505a7}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 04:59:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505a7}]}) getpgid(0xffffffffffffffff) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f0000000200)) 04:59:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) keyctl$revoke(0x3, 0x0) 04:59:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x0, 0x0) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000000)) 04:59:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) socket$alg(0x26, 0x5, 0x0) 04:59:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505a7}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000280)) 04:59:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505a7}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 04:59:40 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000240)=[{0x6}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000100)) 04:59:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505a7}]}) getpgid(0xffffffffffffffff) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f0000000200)) 04:59:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) 04:59:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) keyctl$revoke(0x3, 0x0) 04:59:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000280)) 04:59:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x0, 0x0) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000000)) 04:59:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 04:59:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) socket$alg(0x26, 0x5, 0x0) [ 218.073642] audit: type=1326 audit(1529729980.071:343): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14848 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505a7}]}) getpgid(0xffffffffffffffff) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f0000000200)) 04:59:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) [ 218.169393] audit: type=1326 audit(1529729980.125:344): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14852 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 218.189280] audit: type=1326 audit(1529729980.140:345): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14858 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x0, 0x0) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000000)) 04:59:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) socket$alg(0x26, 0x5, 0x0) 04:59:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) keyctl$revoke(0x3, 0x0) 04:59:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) msgget$private(0x0, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) 04:59:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) getpgid(0xffffffffffffffff) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f0000000200)) 04:59:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) keyctl$revoke(0x3, 0x0) [ 218.477225] audit: type=1326 audit(1529729980.475:346): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14883 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 218.541125] audit: type=1326 audit(1529729980.501:347): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14881 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:40 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000240)=[{0x6}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000100)) 04:59:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) socket$alg(0x26, 0x5, 0x0) 04:59:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x0, 0x0) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000000)) 04:59:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) keyctl$revoke(0x3, 0x0) 04:59:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000280)) 04:59:41 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) [ 219.052508] audit: type=1326 audit(1529729981.050:348): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14901 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) socket$alg(0x26, 0x5, 0x0) 04:59:41 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) keyctl$revoke(0x3, 0x0) [ 219.151126] audit: type=1326 audit(1529729981.145:349): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14906 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000000)) 04:59:41 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) keyctl$revoke(0x3, 0x0) [ 219.242339] audit: type=1326 audit(1529729981.188:350): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14908 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) socket$alg(0x26, 0x5, 0x0) 04:59:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000000)) 04:59:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) getpgid(0xffffffffffffffff) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f0000000200)) 04:59:41 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) msgget$private(0x0, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) 04:59:41 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) keyctl$revoke(0x3, 0x0) 04:59:41 executing program 4: pipe2(&(0x7f0000000040), 0x0) socket$alg(0x26, 0x5, 0x0) 04:59:41 executing program 4: pipe2(&(0x7f0000000040), 0x0) socket$alg(0x26, 0x5, 0x0) 04:59:41 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) keyctl$revoke(0x3, 0x0) 04:59:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000000)) 04:59:41 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='cdg\x00', 0xfffffffffffffebe) io_destroy(0x0) 04:59:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000280)) 04:59:42 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) keyctl$revoke(0x3, 0x0) 04:59:42 executing program 4: pipe2(&(0x7f0000000040), 0x0) socket$alg(0x26, 0x5, 0x0) 04:59:42 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 04:59:42 executing program 2: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x0, 0x0) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000000)) 04:59:42 executing program 2: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x0, 0x0) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000000)) 04:59:42 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) socket$alg(0x26, 0x5, 0x0) 04:59:42 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='cdg\x00', 0xfffffffffffffebe) io_destroy(0x0) 04:59:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) getpgid(0xffffffffffffffff) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f0000000200)) 04:59:42 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) keyctl$revoke(0x3, 0x0) 04:59:42 executing program 2: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x0, 0x0) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000000)) 04:59:42 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) socket$alg(0x26, 0x5, 0x0) 04:59:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) msgget$private(0x0, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) 04:59:42 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='cdg\x00', 0xfffffffffffffebe) io_destroy(0x0) 04:59:42 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) socket$alg(0x26, 0x5, 0x0) 04:59:42 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x0, 0x0) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000000)) 04:59:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='cdg\x00', 0xfffffffffffffebe) io_destroy(0x0) 04:59:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$nl_xfrm(0x10, 0x3, 0x6) keyctl$revoke(0x3, 0x0) 04:59:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000040), 0x0) socket$alg(0x26, 0x5, 0x0) 04:59:43 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x0, 0x0) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000000)) 04:59:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) 04:59:43 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f0000000000)) 04:59:43 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x0, 0x0) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000000)) 04:59:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$nl_xfrm(0x10, 0x3, 0x6) keyctl$revoke(0x3, 0x0) 04:59:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) 04:59:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000040), 0x0) socket$alg(0x26, 0x5, 0x0) 04:59:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) io_destroy(0x0) 04:59:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) 04:59:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x0, 0x0) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000000)) 04:59:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$nl_xfrm(0x10, 0x3, 0x6) keyctl$revoke(0x3, 0x0) 04:59:43 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f0000000000)) 04:59:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) getpgrp(0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x1000)=nil, 0x1000, &(0x7f0000000240)=""/73) 04:59:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x0, 0x0) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000000)) 04:59:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) keyctl$revoke(0x3, 0x0) 04:59:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000040), 0x0) socket$alg(0x26, 0x5, 0x0) 04:59:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) io_destroy(0x0) 04:59:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) 04:59:43 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f0000000000)) 04:59:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) 04:59:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x0, 0x0) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000000)) 04:59:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) msync(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) 04:59:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) keyctl$revoke(0x3, 0x0) 04:59:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) socket$alg(0x26, 0x5, 0x0) 04:59:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) io_destroy(0x0) 04:59:43 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f0000000000)) 04:59:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) pipe2(&(0x7f0000000040), 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x77359400}, {0x0, 0x2710}}, 0x0) 04:59:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x0, 0x0) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000000)) 04:59:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) keyctl$revoke(0x3, 0x0) 04:59:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) 04:59:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) socket$alg(0x26, 0x5, 0x0) 04:59:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) msync(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) 04:59:44 executing program 0: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='cdg\x00', 0xfffffffffffffebe) io_destroy(0x0) 04:59:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f0000000000)) 04:59:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x0, 0x0) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000000)) 04:59:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$nl_xfrm(0x10, 0x3, 0x6) keyctl$revoke(0x3, 0x0) 04:59:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) pipe2(&(0x7f0000000040), 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x77359400}, {0x0, 0x2710}}, 0x0) 04:59:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) socket$alg(0x26, 0x5, 0x0) 04:59:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) 04:59:44 executing program 0: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='cdg\x00', 0xfffffffffffffebe) io_destroy(0x0) 04:59:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x0, 0x0) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000000)) [ 222.394341] kauditd_printk_skb: 6 callbacks suppressed [ 222.394364] audit: type=1326 audit(1529729984.393:357): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15133 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) msync(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) 04:59:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f0000000000)) 04:59:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) pipe2(&(0x7f0000000040), 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x77359400}, {0x0, 0x2710}}, 0x0) 04:59:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000040), 0x0) socket$alg(0x26, 0x5, 0x0) 04:59:44 executing program 0: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='cdg\x00', 0xfffffffffffffebe) io_destroy(0x0) 04:59:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x0, 0x0) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000000)) 04:59:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f0000000000)) 04:59:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) 04:59:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) msync(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) [ 222.726712] audit: type=1326 audit(1529729984.725:358): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15160 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 222.821652] audit: type=1326 audit(1529729984.799:359): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15166 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) pipe2(&(0x7f0000000040), 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x77359400}, {0x0, 0x2710}}, 0x0) 04:59:45 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$nl_xfrm(0x10, 0x3, 0x6) keyctl$revoke(0x3, 0x0) 04:59:45 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='cdg\x00', 0xfffffffffffffebe) io_destroy(0x0) 04:59:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) 04:59:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) msync(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) 04:59:45 executing program 6: creat(&(0x7f00000000c0)='./file0\x00', 0x0) semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f0000000000)) 04:59:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) utimensat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x77359400}, {0x0, 0x2710}}, 0x0) 04:59:45 executing program 6: creat(&(0x7f00000000c0)='./file0\x00', 0x0) semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f0000000000)) 04:59:45 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='cdg\x00', 0xfffffffffffffebe) io_destroy(0x0) [ 223.370643] audit: type=1326 audit(1529729985.369:360): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15195 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) msync(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) 04:59:45 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000040), 0x0) socket$alg(0x26, 0x5, 0x0) 04:59:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) utimensat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x77359400}, {0x0, 0x2710}}, 0x0) 04:59:45 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x0, 0x0) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000000)) 04:59:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) 04:59:45 executing program 6: creat(&(0x7f00000000c0)='./file0\x00', 0x0) semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f0000000000)) 04:59:45 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='cdg\x00', 0xfffffffffffffebe) io_destroy(0x0) 04:59:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) msync(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) [ 223.655027] audit: type=1326 audit(1529729985.653:361): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15213 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 223.777487] audit: type=1326 audit(1529729985.775:362): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15227 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$nl_xfrm(0x10, 0x3, 0x6) keyctl$revoke(0x3, 0x0) 04:59:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) utimensat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x77359400}, {0x0, 0x2710}}, 0x0) 04:59:46 executing program 5: pipe2(&(0x7f0000000040), 0x0) msync(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) 04:59:46 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='cdg\x00', 0xfffffffffffffebe) io_destroy(0x0) 04:59:46 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f0000000000)) 04:59:46 executing program 3: creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) [ 224.301838] audit: type=1326 audit(1529729986.300:363): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15235 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:46 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='cdg\x00', 0xfffffffffffffebe) io_destroy(0x0) 04:59:46 executing program 5: pipe2(&(0x7f0000000040), 0x0) msync(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) 04:59:46 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f0000000000)) 04:59:46 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000040), 0x0) socket$alg(0x26, 0x5, 0x0) 04:59:46 executing program 7: pipe2(&(0x7f0000000040), 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x77359400}, {0x0, 0x2710}}, 0x0) [ 224.602117] audit: type=1326 audit(1529729986.600:364): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15267 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:46 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x0, 0x0) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000000)) 04:59:46 executing program 3: creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) 04:59:46 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f0000000000)) 04:59:46 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='cdg\x00', 0xfffffffffffffebe) io_destroy(0x0) 04:59:46 executing program 5: pipe2(&(0x7f0000000040), 0x0) msync(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) [ 224.694877] audit: type=1326 audit(1529729986.693:365): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15270 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='cdg\x00', 0xfffffffffffffebe) io_destroy(0x0) 04:59:47 executing program 3: creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) 04:59:47 executing program 7: pipe2(&(0x7f0000000040), 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x77359400}, {0x0, 0x2710}}, 0x0) 04:59:47 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f0000000000)) 04:59:47 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) msync(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) 04:59:47 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f0000000000)) 04:59:47 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) 04:59:47 executing program 7: pipe2(&(0x7f0000000040), 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x77359400}, {0x0, 0x2710}}, 0x0) 04:59:47 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) msync(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) 04:59:47 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) pipe2(&(0x7f0000000040), 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x77359400}, {0x0, 0x2710}}, 0x0) 04:59:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='cdg\x00', 0xfffffffffffffebe) io_destroy(0x0) 04:59:47 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) pipe2(&(0x7f0000000040), 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x77359400}, {0x0, 0x2710}}, 0x0) 04:59:47 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f0000000000)) 04:59:47 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) 04:59:47 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) msync(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) 04:59:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='cdg\x00', 0xfffffffffffffebe) io_destroy(0x0) 04:59:47 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) pipe2(&(0x7f0000000040), 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x77359400}, {0x0, 0x2710}}, 0x0) 04:59:47 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) 04:59:47 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f0000000000)) 04:59:47 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000040), 0x0) msync(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) 04:59:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='cdg\x00', 0xfffffffffffffebe) io_destroy(0x0) 04:59:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000080)=""/122, 0x7a) 04:59:47 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) prctl$intptr(0x0, 0x0) 04:59:47 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x20) 04:59:47 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)) pipe2(&(0x7f0000000040), 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x77359400}, {0x0, 0x2710}}, 0x0) 04:59:47 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) [ 225.839815] audit: type=1326 audit(1529729987.838:366): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15347 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:47 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f0000000000)) 04:59:47 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000040), 0x0) msync(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) 04:59:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000080)) 04:59:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000080)=""/122, 0x7a) 04:59:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x20) 04:59:48 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)) pipe2(&(0x7f0000000040), 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x77359400}, {0x0, 0x2710}}, 0x0) 04:59:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) 04:59:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f0000000000)) 04:59:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000040), 0x0) msync(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) 04:59:48 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)) pipe2(&(0x7f0000000040), 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x77359400}, {0x0, 0x2710}}, 0x0) 04:59:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='cdg\x00', 0xfffffffffffffebe) io_destroy(0x0) 04:59:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) 04:59:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f0000000000)) 04:59:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) msync(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) 04:59:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000080)) 04:59:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000080)=""/122, 0x7a) 04:59:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x20) 04:59:48 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505a7}]}) pipe2(&(0x7f0000000040), 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x77359400}, {0x0, 0x2710}}, 0x0) 04:59:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) 04:59:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) msync(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) 04:59:48 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505a7}]}) pipe2(&(0x7f0000000040), 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x77359400}, {0x0, 0x2710}}, 0x0) 04:59:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x20) 04:59:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000080)=""/122, 0x7a) 04:59:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000080)) 04:59:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) 04:59:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505a7}]}) pipe2(&(0x7f0000000040), 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x77359400}, {0x0, 0x2710}}, 0x0) 04:59:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getdents64(0xffffffffffffffff, &(0x7f0000000080)=""/122, 0x7a) 04:59:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='cdg\x00', 0xfffffffffffffebe) io_destroy(0x0) 04:59:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) msync(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) 04:59:49 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000140)=""/68) 04:59:49 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x20) 04:59:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) pipe2(&(0x7f0000000040), 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x77359400}, {0x0, 0x2710}}, 0x0) 04:59:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) 04:59:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f0000000000)) [ 227.720629] kauditd_printk_skb: 2 callbacks suppressed [ 227.720649] audit: type=1326 audit(1529729989.719:369): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15455 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000040), 0x0) msync(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) [ 227.790569] audit: type=1326 audit(1529729989.788:370): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15459 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) [ 227.836563] audit: type=1326 audit(1529729989.819:371): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15463 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:49 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x20) 04:59:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getdents64(0xffffffffffffffff, &(0x7f0000000080)=""/122, 0x7a) [ 227.901492] audit: type=1326 audit(1529729989.876:372): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15470 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:49 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000140)=""/68) [ 227.973303] audit: type=1326 audit(1529729989.931:373): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15474 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getdents64(0xffffffffffffffff, &(0x7f0000000080)=""/122, 0x7a) 04:59:50 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x20) 04:59:50 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000140)=""/68) 04:59:50 executing program 4: pipe2(&(0x7f0000000040), 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x20) 04:59:50 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) pipe2(&(0x7f0000000040), 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x77359400}, {0x0, 0x2710}}, 0x0) 04:59:50 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000080)=""/122, 0x7a) 04:59:50 executing program 4: pipe2(&(0x7f0000000040), 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x20) 04:59:50 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000140)=""/68) 04:59:50 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f0000000000)) 04:59:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0x14, 0x0, 0x0, 0x0, 0x0, {0x10}}, 0x14}, 0x1}, 0x0) [ 228.728806] audit: type=1326 audit(1529729990.727:374): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15506 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:50 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000080)=""/122, 0x7a) 04:59:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000040), 0x0) msync(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) [ 228.774869] audit: type=1326 audit(1529729990.752:375): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15511 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) 04:59:50 executing program 4: pipe2(&(0x7f0000000040), 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x20) 04:59:50 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000140)=""/68) [ 228.893382] audit: type=1326 audit(1529729990.892:376): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15525 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:50 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000080)=""/122, 0x7a) 04:59:51 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0x14, 0x0, 0x0, 0x0, 0x0, {0x10}}, 0x14}, 0x1}, 0x0) [ 228.994038] audit: type=1326 audit(1529729990.992:377): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15535 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:51 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x20) 04:59:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000140)=""/68) 04:59:51 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000080)=""/122, 0x7a) 04:59:51 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) pipe2(&(0x7f0000000040), 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x77359400}, {0x0, 0x2710}}, 0x0) 04:59:51 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000080)=""/122, 0x7a) 04:59:51 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0x14, 0x0, 0x0, 0x0, 0x0, {0x10}}, 0x14}, 0x1}, 0x0) 04:59:51 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x20) 04:59:51 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x20) 04:59:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000140)=""/68) 04:59:51 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) chmod(&(0x7f00000000c0)='./file0\x00', 0x0) [ 229.676810] audit: type=1326 audit(1529729991.675:378): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15562 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000040), 0x0) msync(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) 04:59:51 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000080)=""/122, 0x7a) 04:59:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000040), 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x20) 04:59:51 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) chmod(&(0x7f00000000c0)='./file0\x00', 0x0) 04:59:51 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0x14, 0x0, 0x0, 0x0, 0x0, {0x10}}, 0x14}, 0x1}, 0x0) 04:59:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) 04:59:51 executing program 1: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000140)=""/68) 04:59:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000040), 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x20) 04:59:52 executing program 1: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000140)=""/68) 04:59:52 executing program 1: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000140)=""/68) 04:59:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000080)=""/122, 0x7a) 04:59:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0x14, 0x0, 0x0, 0x0, 0x0, {0x10}}, 0x14}, 0x1}, 0x0) 04:59:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) chmod(&(0x7f00000000c0)='./file0\x00', 0x0) 04:59:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000040), 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x20) 04:59:52 executing program 7: openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500e9}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) clock_settime(0x0, &(0x7f0000000000)={0x0, 0x989680}) 04:59:52 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000140)=""/68) 04:59:52 executing program 7: openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500e9}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) clock_settime(0x0, &(0x7f0000000000)={0x0, 0x989680}) 04:59:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x20) 04:59:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) chmod(&(0x7f00000000c0)='./file0\x00', 0x0) 04:59:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000080)=""/122, 0x7a) 04:59:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0x14, 0x0, 0x0, 0x0, 0x0, {0x10}}, 0x14}, 0x1}, 0x0) 04:59:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_dev$urandom(&(0x7f00000003c0)='/dev/urandom\x00', 0x0, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000080)=""/195) 04:59:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/zero\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000100)) 04:59:52 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000140)=""/68) 04:59:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x20) 04:59:53 executing program 7: openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500e9}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) clock_settime(0x0, &(0x7f0000000000)={0x0, 0x989680}) 04:59:53 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000140)=""/68) 04:59:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000080)=""/122, 0x7a) 04:59:53 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x20) 04:59:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0x14, 0x0, 0x0, 0x0, 0x0, {0x10}}, 0x14}, 0x1}, 0x0) 04:59:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) chmod(&(0x7f00000000c0)='./file0\x00', 0x0) 04:59:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/zero\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000100)) 04:59:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_dev$urandom(&(0x7f00000003c0)='/dev/urandom\x00', 0x0, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000080)=""/195) 04:59:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000140)=""/68) 04:59:53 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000040), 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x20) 04:59:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000080)=""/122, 0x7a) 04:59:53 executing program 7: openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500e9}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) clock_settime(0x0, &(0x7f0000000000)={0x0, 0x989680}) 04:59:53 executing program 0: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0x14, 0x0, 0x0, 0x0, 0x0, {0x10}}, 0x14}, 0x1}, 0x0) 04:59:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/zero\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000100)) 04:59:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) chmod(&(0x7f00000000c0)='./file0\x00', 0x0) 04:59:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_dev$urandom(&(0x7f00000003c0)='/dev/urandom\x00', 0x0, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000080)=""/195) 04:59:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000140)=""/68) 04:59:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000080)=""/122, 0x7a) 04:59:53 executing program 0: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0x14, 0x0, 0x0, 0x0, 0x0, {0x10}}, 0x14}, 0x1}, 0x0) 04:59:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) chmod(&(0x7f00000000c0)='./file0\x00', 0x0) 04:59:53 executing program 7: openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500e9}]}) clock_settime(0x0, &(0x7f0000000000)={0x0, 0x989680}) 04:59:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000140)=""/68) 04:59:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_dev$urandom(&(0x7f00000003c0)='/dev/urandom\x00', 0x0, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000080)=""/195) 04:59:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/zero\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000100)) 04:59:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000080)=""/122, 0x7a) 04:59:54 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000040), 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x20) 04:59:54 executing program 0: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0x14, 0x0, 0x0, 0x0, 0x0, {0x10}}, 0x14}, 0x1}, 0x0) 04:59:54 executing program 6: openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) chmod(&(0x7f00000000c0)='./file0\x00', 0x0) 04:59:54 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000140)=""/68) 04:59:54 executing program 7: openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500e9}]}) clock_settime(0x0, &(0x7f0000000000)={0x0, 0x989680}) 04:59:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000080)=""/122, 0x7a) 04:59:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000100)) 04:59:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000080)=""/195) 04:59:54 executing program 6: openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) chmod(&(0x7f00000000c0)='./file0\x00', 0x0) 04:59:54 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0x14, 0x0, 0x0, 0x0, 0x0, {0x10}}, 0x14}, 0x1}, 0x0) 04:59:54 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000140)=""/68) 04:59:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000100)) 04:59:54 executing program 7: openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500e9}]}) clock_settime(0x0, &(0x7f0000000000)={0x0, 0x989680}) 04:59:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000080)=""/195) 04:59:54 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000140)=""/68) 04:59:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000100)) 04:59:55 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000040), 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x20) 04:59:55 executing program 6: openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) chmod(&(0x7f00000000c0)='./file0\x00', 0x0) 04:59:55 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0x14, 0x0, 0x0, 0x0, 0x0, {0x10}}, 0x14}, 0x1}, 0x0) 04:59:55 executing program 7: openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) clock_settime(0x0, &(0x7f0000000000)={0x0, 0x989680}) 04:59:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000080)=""/195) 04:59:55 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000140)=""/68) 04:59:55 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/zero\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000100)) 04:59:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000080)=""/122, 0x7a) [ 233.360666] kauditd_printk_skb: 5 callbacks suppressed [ 233.360687] audit: type=1326 audit(1529729995.359:384): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15790 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 233.385746] audit: type=1326 audit(1529729995.365:385): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15791 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:55 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0x14, 0x0, 0x0, 0x0, 0x0, {0x10}}, 0x14}, 0x1}, 0x0) 04:59:55 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) chmod(&(0x7f00000000c0)='./file0\x00', 0x0) 04:59:55 executing program 7: openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) clock_settime(0x0, &(0x7f0000000000)={0x0, 0x989680}) 04:59:55 executing program 3: syz_open_dev$urandom(&(0x7f00000003c0)='/dev/urandom\x00', 0x0, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000080)=""/195) 04:59:55 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/zero\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000100)) [ 233.557950] audit: type=1326 audit(1529729995.420:386): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15795 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:55 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0x14, 0x0, 0x0, 0x0, 0x0, {0x10}}, 0x14}, 0x1}, 0x0) 04:59:55 executing program 7: openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) clock_settime(0x0, &(0x7f0000000000)={0x0, 0x989680}) 04:59:55 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) chmod(&(0x7f00000000c0)='./file0\x00', 0x0) 04:59:56 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000080)=""/122, 0x7a) 04:59:56 executing program 3: syz_open_dev$urandom(&(0x7f00000003c0)='/dev/urandom\x00', 0x0, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000080)=""/195) 04:59:56 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/zero\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000100)) 04:59:56 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0x14, 0x0, 0x0, 0x0, 0x0, {0x10}}, 0x14}, 0x1}, 0x0) 04:59:56 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500e9}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) clock_settime(0x0, &(0x7f0000000000)={0x0, 0x989680}) [ 234.334863] audit: type=1326 audit(1529729996.333:387): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15842 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000140)=""/68) 04:59:56 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) chmod(&(0x7f00000000c0)='./file0\x00', 0x0) 04:59:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000040)=0x3) 04:59:56 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0x14, 0x0, 0x0, 0x0, 0x0, {0x10}}, 0x14}, 0x1}, 0x0) 04:59:56 executing program 3: syz_open_dev$urandom(&(0x7f00000003c0)='/dev/urandom\x00', 0x0, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000080)=""/195) 04:59:56 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/zero\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000100)) 04:59:56 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500e9}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) clock_settime(0x0, &(0x7f0000000000)={0x0, 0x989680}) [ 234.504008] audit: type=1326 audit(1529729996.502:388): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15857 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:56 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) chmod(&(0x7f00000000c0)='./file0\x00', 0x0) 04:59:56 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_dev$urandom(&(0x7f00000003c0)='/dev/urandom\x00', 0x0, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000080)=""/195) 04:59:56 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0x14, 0x0, 0x0, 0x0, 0x0, {0x10}}, 0x14}, 0x1}, 0x0) 04:59:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000040)=0x3) 04:59:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000040)=0x3) 04:59:57 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/zero\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000100)) 04:59:57 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500e9}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) clock_settime(0x0, &(0x7f0000000000)={0x0, 0x989680}) 04:59:57 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_dev$urandom(&(0x7f00000003c0)='/dev/urandom\x00', 0x0, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000080)=""/195) 04:59:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) chmod(&(0x7f00000000c0)='./file0\x00', 0x0) 04:59:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000140)=""/68) 04:59:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0x14, 0x0, 0x0, 0x0, 0x0, {0x10}}, 0x14}, 0x1}, 0x0) 04:59:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f00000001c0)) 04:59:57 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/zero\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000100)) 04:59:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000040)=0x3) 04:59:57 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) syz_open_dev$urandom(&(0x7f00000003c0)='/dev/urandom\x00', 0x0, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000080)=""/195) 04:59:57 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500e9}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) clock_settime(0x0, &(0x7f0000000000)={0x0, 0x989680}) 04:59:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) chmod(&(0x7f00000000c0)='./file0\x00', 0x0) [ 235.483334] audit: type=1326 audit(1529729997.482:389): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15922 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:57 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) clock_settime(0x0, &(0x7f0000000000)={0x0, 0x989680}) 04:59:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0x14, 0x0, 0x0, 0x0, 0x0, {0x10}}, 0x14}, 0x1}, 0x0) 04:59:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) chmod(&(0x7f00000000c0)='./file0\x00', 0x0) 04:59:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/zero\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000100)) 04:59:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) syz_open_dev$urandom(&(0x7f00000003c0)='/dev/urandom\x00', 0x0, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000080)=""/195) 04:59:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f00000001c0)) 04:59:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000040)=0x3) 04:59:57 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) clock_settime(0x0, &(0x7f0000000000)={0x0, 0x989680}) 04:59:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) clock_settime(0x0, &(0x7f0000000000)={0x0, 0x989680}) 04:59:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0x14, 0x0, 0x0, 0x0, 0x0, {0x10}}, 0x14}, 0x1}, 0x0) 04:59:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) chmod(&(0x7f00000000c0)='./file0\x00', 0x0) 04:59:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/zero\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000100)) 04:59:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) syz_open_dev$urandom(&(0x7f00000003c0)='/dev/urandom\x00', 0x0, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000080)=""/195) 04:59:58 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000040)=0x3) 04:59:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f00000001c0)) 04:59:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50353}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) [ 236.449473] audit: type=1326 audit(1529729998.448:390): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15958 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500e9}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) clock_settime(0x0, &(0x7f0000000000)={0x0, 0x989680}) 04:59:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) chmod(&(0x7f00000000c0)='./file0\x00', 0x0) 04:59:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) syz_open_dev$urandom(&(0x7f00000003c0)='/dev/urandom\x00', 0x0, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000080)=""/195) 04:59:58 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000040)=0x3) 04:59:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/zero\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000100)) 04:59:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500e9}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) clock_settime(0x0, &(0x7f0000000000)={0x0, 0x989680}) 04:59:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f00000001c0)) 04:59:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50353}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) 04:59:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) chmod(&(0x7f00000000c0)='./file0\x00', 0x0) [ 236.859688] audit: type=1326 audit(1529729998.858:391): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16000 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0x14, 0x0, 0x0, 0x0, 0x0, {0x10}}, 0x14}, 0x1}, 0x0) 04:59:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) syz_open_dev$urandom(&(0x7f00000003c0)='/dev/urandom\x00', 0x0, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000080)=""/195) 04:59:59 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/zero\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000100)) 04:59:59 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000040)=0x3) 04:59:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500e9}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) clock_settime(0x0, &(0x7f0000000000)={0x0, 0x989680}) 04:59:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f00000001c0)) 04:59:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50353}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) 04:59:59 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000040)=0x3) [ 237.408235] audit: type=1326 audit(1529729999.406:392): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16020 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) syz_open_dev$urandom(&(0x7f00000003c0)='/dev/urandom\x00', 0x0, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000080)=""/195) 04:59:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f00000001c0)) 04:59:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) clock_settime(0x0, &(0x7f0000000000)={0x0, 0x989680}) 04:59:59 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/zero\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000100)) 04:59:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50353}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) 04:59:59 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000040)=0x3) [ 237.595451] audit: type=1326 audit(1529729999.594:393): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16034 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 04:59:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) syz_open_dev$urandom(&(0x7f00000003c0)='/dev/urandom\x00', 0x0, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000080)=""/195) 04:59:59 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) chmod(&(0x7f00000000c0)='./file0\x00', 0x0) 05:00:00 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0x14, 0x0, 0x0, 0x0, 0x0, {0x10}}, 0x14}, 0x1}, 0x0) 05:00:00 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/zero\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000100)) 05:00:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f00000001c0)) 05:00:00 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000040)=0x3) 05:00:00 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50353}]}) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) 05:00:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) syz_open_dev$urandom(&(0x7f00000003c0)='/dev/urandom\x00', 0x0, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000080)=""/195) 05:00:00 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f00000001c0)) 05:00:00 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/zero\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000100)) [ 238.383485] kauditd_printk_skb: 2 callbacks suppressed [ 238.383507] audit: type=1326 audit(1529730000.382:396): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16068 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:00 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50353}]}) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) 05:00:00 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000040)=0x3) 05:00:00 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) clock_settime(0x0, &(0x7f0000000000)={0x0, 0x989680}) 05:00:00 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f00000001c0)) [ 238.527990] audit: type=1326 audit(1529730000.526:397): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16077 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:00 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000040)=0x3) [ 238.588618] audit: type=1326 audit(1529730000.585:398): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16083 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:00 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50353}]}) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) 05:00:00 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f00000001c0)) 05:00:00 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) chmod(&(0x7f00000000c0)='./file0\x00', 0x0) [ 238.869615] audit: type=1326 audit(1529730000.868:399): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16102 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) syz_open_dev$urandom(&(0x7f00000003c0)='/dev/urandom\x00', 0x0, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000080)=""/195) 05:00:01 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000040)=0x3) 05:00:01 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) 05:00:01 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f00000001c0)) 05:00:01 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000100)=""/42) [ 239.307834] audit: type=1326 audit(1529730001.306:400): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16109 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:01 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f00000001c0)) 05:00:01 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000040)=0x3) 05:00:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/zero\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000100)) 05:00:01 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) 05:00:01 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000100)=""/42) 05:00:01 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) clock_settime(0x0, &(0x7f0000000000)={0x0, 0x989680}) 05:00:01 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f00000001c0)) 05:00:01 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000040)=0x3) [ 239.546266] audit: type=1326 audit(1529730001.536:401): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16132 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:01 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) [ 239.657002] audit: type=1326 audit(1529730001.655:402): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16140 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:01 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50353}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) 05:00:01 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000100)=""/42) 05:00:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000040)=0x3) 05:00:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000100)=""/42) 05:00:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f00000001c0)) 05:00:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100)) 05:00:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) syz_open_dev$urandom(&(0x7f00000003c0)='/dev/urandom\x00', 0x0, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000080)=""/195) 05:00:02 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50353}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) [ 240.299031] audit: type=1326 audit(1529730002.297:403): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16173 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:02 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50353}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) 05:00:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/zero\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000100)) 05:00:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000100)=""/42) 05:00:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f00000001c0)) [ 240.520880] audit: type=1326 audit(1529730002.519:404): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16191 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f00000001c0)) 05:00:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000040)=0x3) 05:00:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) 05:00:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100)) 05:00:02 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) memfd_create(&(0x7f0000000000)='/dev/zero\x00', 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) 05:00:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000100)=""/42) 05:00:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000040)=0x3) 05:00:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000040)=0x3) 05:00:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) 05:00:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f00000001c0)) 05:00:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100)) 05:00:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000100)=""/42) 05:00:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') syz_open_dev$sg(&(0x7f0000000300)='/dev/sg#\x00', 0x0, 0x0) [ 241.239633] audit: type=1326 audit(1529730003.238:405): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16225 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') syz_open_dev$sg(&(0x7f0000000300)='/dev/sg#\x00', 0x0, 0x0) 05:00:03 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000080)) 05:00:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) 05:00:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f00000001c0)) 05:00:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100)) 05:00:03 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000100)=""/42) 05:00:03 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept4$packet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000040)=0x14, 0x0) 05:00:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50353}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) 05:00:03 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000100)=""/42) 05:00:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f00000001c0)) 05:00:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000040)=0x3) 05:00:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') syz_open_dev$sg(&(0x7f0000000300)='/dev/sg#\x00', 0x0, 0x0) 05:00:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100)) 05:00:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/81, 0x51) 05:00:04 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) sysinfo(&(0x7f00000003c0)=""/190) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000000c0)={0x303, 0x33}, 0x4) 05:00:04 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50353}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) 05:00:04 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000100)=""/42) 05:00:04 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f00000001c0)) 05:00:04 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50353}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) 05:00:04 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000100)=""/42) 05:00:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100)) 05:00:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') syz_open_dev$sg(&(0x7f0000000300)='/dev/sg#\x00', 0x0, 0x0) 05:00:04 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) sysinfo(&(0x7f00000003c0)=""/190) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000000c0)={0x303, 0x33}, 0x4) 05:00:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/81, 0x51) 05:00:04 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000100)=""/42) 05:00:04 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) 05:00:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000040)=0x3) 05:00:05 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100)) 05:00:05 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) syz_open_dev$sg(&(0x7f0000000300)='/dev/sg#\x00', 0x0, 0x0) 05:00:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/81, 0x51) 05:00:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) sysinfo(&(0x7f00000003c0)=""/190) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000000c0)={0x303, 0x33}, 0x4) 05:00:05 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000100)=""/42) 05:00:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f00000001c0)) 05:00:05 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000100)=""/42) 05:00:05 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100)) 05:00:05 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) syz_open_dev$sg(&(0x7f0000000300)='/dev/sg#\x00', 0x0, 0x0) 05:00:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/81, 0x51) 05:00:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) sysinfo(&(0x7f00000003c0)=""/190) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000000c0)={0x303, 0x33}, 0x4) 05:00:05 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000100)=""/42) 05:00:05 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100)) 05:00:05 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) syz_open_dev$sg(&(0x7f0000000300)='/dev/sg#\x00', 0x0, 0x0) 05:00:05 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) [ 243.615932] kauditd_printk_skb: 5 callbacks suppressed [ 243.615952] audit: type=1326 audit(1529730005.614:411): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16366 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 05:00:06 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/81, 0x51) 05:00:06 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000100)=""/42) 05:00:06 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100)) 05:00:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000000c0)={0x303, 0x33}, 0x4) 05:00:06 executing program 7: syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') syz_open_dev$sg(&(0x7f0000000300)='/dev/sg#\x00', 0x0, 0x0) 05:00:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f00000001c0)) [ 244.131156] audit: type=1326 audit(1529730006.130:412): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16376 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:06 executing program 7: syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') syz_open_dev$sg(&(0x7f0000000300)='/dev/sg#\x00', 0x0, 0x0) 05:00:06 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505a7}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000100)=""/42) 05:00:06 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100)) 05:00:06 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/81, 0x51) 05:00:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000000c0)={0x303, 0x33}, 0x4) 05:00:06 executing program 7: syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') syz_open_dev$sg(&(0x7f0000000300)='/dev/sg#\x00', 0x0, 0x0) 05:00:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 05:00:06 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100)) 05:00:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) 05:00:06 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505a7}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000100)=""/42) 05:00:06 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/81, 0x51) 05:00:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000000c0)={0x303, 0x33}, 0x4) 05:00:06 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') syz_open_dev$sg(&(0x7f0000000300)='/dev/sg#\x00', 0x0, 0x0) 05:00:06 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100)) 05:00:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) [ 244.705683] audit: type=1326 audit(1529730006.703:413): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16427 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 05:00:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505a7}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000100)=""/42) 05:00:07 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') syz_open_dev$sg(&(0x7f0000000300)='/dev/sg#\x00', 0x0, 0x0) 05:00:07 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/81, 0x51) 05:00:07 executing program 5: sysinfo(&(0x7f00000003c0)=""/190) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000000c0)={0x303, 0x33}, 0x4) 05:00:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100)) 05:00:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e40)={{{@in6=@ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, @in6}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@local={0xfe, 0x80, [], 0xaa}}}, 0xe8) 05:00:07 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') syz_open_dev$sg(&(0x7f0000000300)='/dev/sg#\x00', 0x0, 0x0) 05:00:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000100)=""/42) [ 245.265395] audit: type=1326 audit(1529730007.264:414): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16467 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:07 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') syz_open_dev$sg(&(0x7f0000000300)='/dev/sg#\x00', 0x0, 0x0) 05:00:07 executing program 5: sysinfo(&(0x7f00000003c0)=""/190) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000000c0)={0x303, 0x33}, 0x4) 05:00:07 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/81, 0x51) 05:00:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100)) 05:00:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 05:00:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e40)={{{@in6=@ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, @in6}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@local={0xfe, 0x80, [], 0xaa}}}, 0xe8) 05:00:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000800)) 05:00:07 executing program 5: sysinfo(&(0x7f00000003c0)=""/190) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000000c0)={0x303, 0x33}, 0x4) 05:00:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100)) 05:00:07 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/81, 0x51) 05:00:07 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') syz_open_dev$sg(&(0x7f0000000300)='/dev/sg#\x00', 0x0, 0x0) 05:00:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 05:00:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e40)={{{@in6=@ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, @in6}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@local={0xfe, 0x80, [], 0xaa}}}, 0xe8) 05:00:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000800)) 05:00:07 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) sysinfo(&(0x7f00000003c0)=""/190) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000000c0)={0x303, 0x33}, 0x4) 05:00:08 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000100)=""/42) 05:00:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x8000502b5}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100)) 05:00:08 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/81, 0x51) 05:00:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') syz_open_dev$sg(&(0x7f0000000300)='/dev/sg#\x00', 0x0, 0x0) 05:00:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 05:00:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e40)={{{@in6=@ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, @in6}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@local={0xfe, 0x80, [], 0xaa}}}, 0xe8) 05:00:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000800)) 05:00:08 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) sysinfo(&(0x7f00000003c0)=""/190) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000000c0)={0x303, 0x33}, 0x4) [ 246.231663] audit: type=1326 audit(1529730008.230:415): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16532 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:08 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) sysinfo(&(0x7f00000003c0)=""/190) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000000c0)={0x303, 0x33}, 0x4) 05:00:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') syz_open_dev$sg(&(0x7f0000000300)='/dev/sg#\x00', 0x0, 0x0) 05:00:08 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/81, 0x51) 05:00:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x8000502b5}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100)) 05:00:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e40)={{{@in6=@ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, @in6}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@local={0xfe, 0x80, [], 0xaa}}}, 0xe8) 05:00:08 executing program 4: creat(&(0x7f0000000040)='./file0\x00', 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 05:00:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000800)) 05:00:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) sysinfo(&(0x7f00000003c0)=""/190) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000000c0)={0x303, 0x33}, 0x4) 05:00:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000100)=""/42) 05:00:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') syz_open_dev$sg(&(0x7f0000000300)='/dev/sg#\x00', 0x0, 0x0) 05:00:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x8000502b5}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100)) 05:00:09 executing program 4: creat(&(0x7f0000000040)='./file0\x00', 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 05:00:09 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/81, 0x51) 05:00:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e40)={{{@in6=@ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, @in6}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@local={0xfe, 0x80, [], 0xaa}}}, 0xe8) 05:00:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000800)) 05:00:09 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) sysinfo(&(0x7f00000003c0)=""/190) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000000c0)={0x303, 0x33}, 0x4) [ 247.179204] audit: type=1326 audit(1529730009.177:416): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16571 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:09 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) sysinfo(&(0x7f00000003c0)=""/190) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000000c0)={0x303, 0x33}, 0x4) 05:00:09 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/81, 0x51) 05:00:09 executing program 4: creat(&(0x7f0000000040)='./file0\x00', 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 05:00:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100)) 05:00:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') syz_open_dev$sg(&(0x7f0000000300)='/dev/sg#\x00', 0x0, 0x0) 05:00:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e40)={{{@in6=@ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, @in6}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@local={0xfe, 0x80, [], 0xaa}}}, 0xe8) 05:00:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000800)) [ 247.410887] audit: type=1326 audit(1529730009.409:417): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16597 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:09 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) sysinfo(&(0x7f00000003c0)=""/190) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000000c0)={0x303, 0x33}, 0x4) 05:00:10 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) sysinfo(&(0x7f00000003c0)=""/190) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000000c0)={0x303, 0x33}, 0x4) 05:00:10 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/81, 0x51) 05:00:10 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 05:00:10 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') syz_open_dev$sg(&(0x7f0000000300)='/dev/sg#\x00', 0x0, 0x0) 05:00:10 executing program 2: socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e40)={{{@in6=@ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, @in6}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@local={0xfe, 0x80, [], 0xaa}}}, 0xe8) 05:00:10 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6, 0x0, 0x0, 0x50344}]}) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:00:10 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000800)) [ 248.104382] audit: type=1326 audit(1529730010.103:418): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16621 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:10 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 05:00:10 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) sysinfo(&(0x7f00000003c0)=""/190) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000000c0)={0x303, 0x33}, 0x4) 05:00:10 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/81, 0x51) 05:00:10 executing program 2: socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e40)={{{@in6=@ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, @in6}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@local={0xfe, 0x80, [], 0xaa}}}, 0xe8) 05:00:10 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100)) 05:00:10 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000800)) 05:00:10 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) sysinfo(&(0x7f00000003c0)=""/190) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000000c0)={0x303, 0x33}, 0x4) 05:00:10 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 05:00:10 executing program 2: socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e40)={{{@in6=@ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, @in6}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@local={0xfe, 0x80, [], 0xaa}}}, 0xe8) 05:00:10 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6, 0x0, 0x0, 0x50344}]}) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 248.408723] audit: type=1326 audit(1529730010.407:419): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16653 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:10 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000800)) 05:00:10 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x8000502b5}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/81, 0x51) [ 248.533108] audit: type=1326 audit(1529730010.448:420): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16652 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:11 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') syz_open_dev$sg(&(0x7f0000000300)='/dev/sg#\x00', 0x0, 0x0) 05:00:11 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x8000502b5}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/81, 0x51) 05:00:11 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e40)={{{@in6=@ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, @in6}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@local={0xfe, 0x80, [], 0xaa}}}, 0xe8) 05:00:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)) creat(&(0x7f0000000040)='./file0\x00', 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 05:00:11 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000800)) 05:00:11 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6, 0x0, 0x0, 0x50344}]}) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:00:11 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000800)) [ 249.066750] audit: type=1326 audit(1529730011.065:421): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16688 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)) creat(&(0x7f0000000040)='./file0\x00', 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 05:00:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100)) 05:00:11 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e40)={{{@in6=@ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, @in6}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@local={0xfe, 0x80, [], 0xaa}}}, 0xe8) 05:00:11 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x8000502b5}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/81, 0x51) 05:00:11 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6, 0x0, 0x0, 0x50344}]}) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:00:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)) creat(&(0x7f0000000040)='./file0\x00', 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 05:00:11 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000800)) 05:00:11 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) sysinfo(&(0x7f00000003c0)=""/190) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000000c0)={0x303, 0x33}, 0x4) 05:00:11 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e40)={{{@in6=@ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, @in6}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@local={0xfe, 0x80, [], 0xaa}}}, 0xe8) [ 249.394799] audit: type=1326 audit(1529730011.393:422): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16711 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 249.481608] audit: type=1326 audit(1529730011.421:423): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16717 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:11 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000800)) 05:00:11 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') syz_open_dev$sg(&(0x7f0000000300)='/dev/sg#\x00', 0x0, 0x0) 05:00:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505a7}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 05:00:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e40)={{{@in6=@ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, @in6}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@local={0xfe, 0x80, [], 0xaa}}}, 0xe8) 05:00:11 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/81, 0x51) 05:00:11 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6, 0x0, 0x0, 0x50344}]}) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 250.008267] audit: type=1326 audit(1529730012.006:424): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16728 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e40)={{{@in6=@ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, @in6}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@local={0xfe, 0x80, [], 0xaa}}}, 0xe8) 05:00:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505a7}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) [ 250.063330] audit: type=1326 audit(1529730012.061:425): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16738 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) sysinfo(&(0x7f00000003c0)=""/190) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000000c0)={0x303, 0x33}, 0x4) 05:00:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000800)) 05:00:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6, 0x0, 0x0, 0x50344}]}) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:00:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505a7}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 05:00:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e40)={{{@in6=@ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, @in6}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@local={0xfe, 0x80, [], 0xaa}}}, 0xe8) 05:00:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) getpgid(0xffffffffffffffff) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000000c0)) 05:00:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) [ 250.379766] audit: type=1326 audit(1529730012.378:426): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16759 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000800)) 05:00:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6, 0x0, 0x0, 0x50344}]}) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 250.480443] audit: type=1326 audit(1529730012.478:427): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16768 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000800)) 05:00:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e40)={{{@in6=@ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, @in6}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@local={0xfe, 0x80, [], 0xaa}}}, 0xe8) 05:00:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) getpgid(0xffffffffffffffff) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000000c0)) 05:00:12 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/81, 0x51) 05:00:12 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:00:12 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f00000000c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000140)=0xfdd1) getrlimit(0x0, &(0x7f0000000300)) [ 250.997516] audit: type=1326 audit(1529730012.996:428): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16788 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:13 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:00:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e40)={{{@in6=@ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, @in6}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@local={0xfe, 0x80, [], 0xaa}}}, 0xe8) 05:00:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000800)) 05:00:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) getpgid(0xffffffffffffffff) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000000c0)) 05:00:13 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:00:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f00000000c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000140)=0xfdd1) getrlimit(0x0, &(0x7f0000000300)) 05:00:13 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f0000000100)) 05:00:13 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 05:00:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e40)={{{@in6=@ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, @in6}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@local={0xfe, 0x80, [], 0xaa}}}, 0xe8) 05:00:13 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6, 0x0, 0x0, 0x50344}]}) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:00:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000800)) 05:00:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) getpgid(0xffffffffffffffff) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000000c0)) 05:00:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f00000000c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000140)=0xfdd1) getrlimit(0x0, &(0x7f0000000300)) [ 251.521597] audit: type=1326 audit(1529730013.520:429): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16828 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:13 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/81, 0x51) 05:00:13 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f0000000100)) 05:00:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e40)={{{@in6=@ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, @in6}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@local={0xfe, 0x80, [], 0xaa}}}, 0xe8) 05:00:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000800)) 05:00:13 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6, 0x0, 0x0, 0x50344}]}) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:00:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000000c0)) 05:00:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f00000000c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000140)=0xfdd1) getrlimit(0x0, &(0x7f0000000300)) [ 251.938446] audit: type=1326 audit(1529730013.937:430): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16852 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:14 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6, 0x0, 0x0, 0x50344}]}) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:00:14 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000000c0)) 05:00:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000800)) 05:00:14 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 05:00:14 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getrlimit(0x0, &(0x7f0000000300)) 05:00:14 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f0000000100)) 05:00:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000600)}) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:00:14 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000000c0)) 05:00:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000600)}) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:00:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e40)={{{@in6=@ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, @in6}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@local={0xfe, 0x80, [], 0xaa}}}, 0xe8) 05:00:14 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getrlimit(0x0, &(0x7f0000000300)) 05:00:14 executing program 6: getpgid(0xffffffffffffffff) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000000c0)) 05:00:14 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f0000000100)) 05:00:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000600)}) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:00:14 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) write$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xfffffffffffffe9d) 05:00:14 executing program 6: getpgid(0xffffffffffffffff) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000000c0)) 05:00:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x0, 0x0, 0x0, 0x50344}]}) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:00:15 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getrlimit(0x0, &(0x7f0000000300)) 05:00:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000800)) 05:00:15 executing program 7: getsockname(0xffffffffffffffff, &(0x7f00000000c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000140)=0xfdd1) getrlimit(0x0, &(0x7f0000000300)) 05:00:15 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]}) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f0000000100)) 05:00:15 executing program 6: getpgid(0xffffffffffffffff) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000000c0)) 05:00:15 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x0, 0x0, 0x0, 0x50344}]}) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:00:15 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) write$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xfffffffffffffe9d) 05:00:15 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, &(0x7f0000000240)) 05:00:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e40)={{{@in6=@ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, @in6}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@local={0xfe, 0x80, [], 0xaa}}}, 0xe8) 05:00:15 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) getpgid(0xffffffffffffffff) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000000c0)) 05:00:15 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x0, 0x0, 0x0, 0x50344}]}) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:00:15 executing program 7: getsockname(0xffffffffffffffff, &(0x7f00000000c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000140)=0xfdd1) getrlimit(0x0, &(0x7f0000000300)) 05:00:15 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]}) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f0000000100)) 05:00:15 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) write$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xfffffffffffffe9d) 05:00:15 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, &(0x7f0000000240)) 05:00:15 executing program 7: getsockname(0xffffffffffffffff, &(0x7f00000000c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000140)=0xfdd1) getrlimit(0x0, &(0x7f0000000300)) 05:00:15 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6}]}) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:00:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000800)) 05:00:16 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) getpgid(0xffffffffffffffff) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000000c0)) 05:00:16 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]}) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f0000000100)) 05:00:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) write$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xfffffffffffffe9d) 05:00:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, &(0x7f0000000240)) 05:00:16 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f00000000c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000140)=0xfdd1) getrlimit(0x0, &(0x7f0000000300)) 05:00:16 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f00000000c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000140)=0xfdd1) getrlimit(0x0, &(0x7f0000000300)) [ 254.186654] kauditd_printk_skb: 7 callbacks suppressed [ 254.186675] audit: type=1326 audit(1529730016.184:438): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16988 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:16 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f00000000c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000140)=0xfdd1) getrlimit(0x0, &(0x7f0000000300)) 05:00:16 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) getpgid(0xffffffffffffffff) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000000c0)) 05:00:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, &(0x7f0000000240)) 05:00:16 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f0000000100)) 05:00:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) write$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xfffffffffffffe9d) 05:00:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000240)) 05:00:16 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f0000000100)) 05:00:16 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) getsockname(0xffffffffffffffff, &(0x7f00000000c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000140)=0xfdd1) getrlimit(0x0, &(0x7f0000000300)) 05:00:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6}]}) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:00:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) clock_gettime(0x0, &(0x7f00000003c0)) utimensat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', &(0x7f0000000440), 0x0) 05:00:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)) getpgid(0xffffffffffffffff) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000000c0)) 05:00:17 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) write$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xfffffffffffffe9d) 05:00:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, &(0x7f0000000240)) 05:00:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d9}]}) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) [ 255.079782] audit: type=1326 audit(1529730017.078:439): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17025 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:17 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) getsockname(0xffffffffffffffff, &(0x7f00000000c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000140)=0xfdd1) getrlimit(0x0, &(0x7f0000000300)) 05:00:17 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f0000000100)) 05:00:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)) getpgid(0xffffffffffffffff) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000000c0)) 05:00:17 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) write$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xfffffffffffffe9d) 05:00:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, &(0x7f0000000240)) 05:00:17 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f0000000100)) 05:00:17 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) getsockname(0xffffffffffffffff, &(0x7f00000000c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000140)=0xfdd1) getrlimit(0x0, &(0x7f0000000300)) 05:00:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d9}]}) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 05:00:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) clock_gettime(0x0, &(0x7f00000003c0)) utimensat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', &(0x7f0000000440), 0x0) 05:00:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)) getpgid(0xffffffffffffffff) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000000c0)) 05:00:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6}]}) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:00:17 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) write$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xfffffffffffffe9d) 05:00:17 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f00000000c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000140)=0xfdd1) getrlimit(0x0, &(0x7f0000000300)) 05:00:17 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f0000000100)) 05:00:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, &(0x7f0000000240)) 05:00:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505a7}]}) getpgid(0xffffffffffffffff) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000000c0)) 05:00:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d9}]}) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 05:00:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) clock_gettime(0x0, &(0x7f00000003c0)) utimensat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', &(0x7f0000000440), 0x0) 05:00:18 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, &(0x7f0000000240)) [ 256.056761] audit: type=1326 audit(1529730018.055:440): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17091 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505a7}]}) getpgid(0xffffffffffffffff) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000000c0)) 05:00:18 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) write$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xfffffffffffffe9d) 05:00:18 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f0000000100)) 05:00:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f00000000c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000140)=0xfdd1) getrlimit(0x0, &(0x7f0000000300)) 05:00:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) clock_gettime(0x0, &(0x7f00000003c0)) utimensat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', &(0x7f0000000440), 0x0) 05:00:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d9}]}) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 05:00:18 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, &(0x7f0000000240)) 05:00:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f00000000c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000140)=0xfdd1) getrlimit(0x0, &(0x7f0000000300)) 05:00:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505a7}]}) getpgid(0xffffffffffffffff) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000000c0)) 05:00:18 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) write$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xfffffffffffffe9d) 05:00:18 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f0000000040)) 05:00:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d9}]}) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 05:00:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000140)}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f0000000100)) 05:00:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) utimensat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', &(0x7f0000000440), 0x0) 05:00:18 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, &(0x7f0000000240)) 05:00:19 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) write$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xfffffffffffffe9d) 05:00:19 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, &(0x7f0000000240)) 05:00:19 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) getsockname(0xffffffffffffffff, &(0x7f00000000c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000140)=0xfdd1) getrlimit(0x0, &(0x7f0000000300)) 05:00:19 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000140)}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f0000000100)) 05:00:19 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) getpgid(0xffffffffffffffff) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000000c0)) 05:00:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) utimensat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', &(0x7f0000000440), 0x0) 05:00:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d9}]}) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) [ 257.187688] audit: type=1326 audit(1529730019.186:441): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17156 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:19 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f0000000040)) 05:00:19 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, &(0x7f0000000240)) [ 257.292359] audit: type=1326 audit(1529730019.276:442): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17154 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:19 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) write$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xfffffffffffffe9d) 05:00:19 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000140)}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f0000000100)) 05:00:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) utimensat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', &(0x7f0000000440), 0x0) 05:00:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d9}]}) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 05:00:19 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) write$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xfffffffffffffe9d) 05:00:19 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f0000000040)) 05:00:19 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, &(0x7f0000000240)) 05:00:19 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5022b}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f0000000100)) 05:00:19 executing program 2: clock_gettime(0x0, &(0x7f00000003c0)) utimensat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', &(0x7f0000000440), 0x0) 05:00:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) write$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xfffffffffffffe9d) 05:00:20 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) getsockname(0xffffffffffffffff, &(0x7f00000000c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000140)=0xfdd1) getrlimit(0x0, &(0x7f0000000300)) 05:00:20 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 05:00:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f0000000040)) 05:00:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, &(0x7f0000000240)) 05:00:20 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5022b}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f0000000100)) 05:00:20 executing program 2: clock_gettime(0x0, &(0x7f00000003c0)) utimensat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', &(0x7f0000000440), 0x0) 05:00:20 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) getpgid(0xffffffffffffffff) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000000c0)) [ 258.167770] audit: type=1326 audit(1529730020.166:443): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17212 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) write$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xfffffffffffffe9d) 05:00:20 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5022b}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f0000000100)) 05:00:20 executing program 2: clock_gettime(0x0, &(0x7f00000003c0)) utimensat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', &(0x7f0000000440), 0x0) 05:00:20 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 05:00:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, &(0x7f0000000240)) [ 258.241254] audit: type=1326 audit(1529730020.202:444): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17223 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f0000000040)) 05:00:20 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 05:00:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) write$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xfffffffffffffe9d) 05:00:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, &(0x7f0000000240)) 05:00:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f0000000100)) 05:00:21 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) getsockname(0xffffffffffffffff, &(0x7f00000000c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000140)=0xfdd1) getrlimit(0x0, &(0x7f0000000300)) 05:00:21 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d9}]}) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 05:00:21 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) clock_gettime(0x0, &(0x7f00000003c0)) utimensat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', &(0x7f0000000440), 0x0) 05:00:21 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f0000000040)) 05:00:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x8000502b5}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) write$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xfffffffffffffe9d) 05:00:21 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) getpgid(0xffffffffffffffff) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000000c0)) 05:00:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x8000502b5}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, &(0x7f0000000240)) [ 259.144108] audit: type=1326 audit(1529730021.142:445): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17263 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x8000502b5}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) write$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xfffffffffffffe9d) 05:00:21 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) clock_gettime(0x0, &(0x7f00000003c0)) utimensat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', &(0x7f0000000440), 0x0) 05:00:21 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d9}]}) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) [ 259.208557] audit: type=1326 audit(1529730021.175:446): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17270 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 259.228412] audit: type=1326 audit(1529730021.194:447): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17276 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x8000502b5}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, &(0x7f0000000240)) 05:00:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x8000502b5}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) write$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xfffffffffffffe9d) 05:00:21 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f0000000040)) 05:00:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x8000502b5}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, &(0x7f0000000240)) 05:00:21 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) clock_gettime(0x0, &(0x7f00000003c0)) utimensat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', &(0x7f0000000440), 0x0) 05:00:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f0000000100)) 05:00:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f00000003c0)) utimensat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', &(0x7f0000000440), 0x0) 05:00:22 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d9}]}) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 05:00:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) write$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xfffffffffffffe9d) 05:00:22 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f0000000040)) 05:00:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, &(0x7f0000000240)) [ 260.077342] audit: type=1326 audit(1529730022.076:448): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17313 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000280)}) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) [ 260.151845] audit: type=1326 audit(1529730022.150:449): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17319 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:22 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f0000000040)) 05:00:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f00000003c0)) utimensat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', &(0x7f0000000440), 0x0) [ 260.215725] audit: type=1326 audit(1529730022.186:450): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17321 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000280)}) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 05:00:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f00000003c0)) utimensat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', &(0x7f0000000440), 0x0) 05:00:22 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f0000000040)) 05:00:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000280)}) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 05:00:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50356}]}) clock_gettime(0x0, &(0x7f00000003c0)) utimensat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', &(0x7f0000000440), 0x0) 05:00:22 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f0000000040)) 05:00:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d9}]}) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 05:00:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f0000000100)) 05:00:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50356}]}) clock_gettime(0x0, &(0x7f00000003c0)) utimensat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', &(0x7f0000000440), 0x0) 05:00:22 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f0000000040)) [ 261.013368] audit: type=1326 audit(1529730023.011:451): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17362 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:23 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f0000000040)) 05:00:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50356}]}) clock_gettime(0x0, &(0x7f00000003c0)) utimensat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', &(0x7f0000000440), 0x0) 05:00:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d9}]}) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 05:00:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) 05:00:23 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, &(0x7f0000000240)) 05:00:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 05:00:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) write$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xfffffffffffffe9d) [ 261.179527] audit: type=1326 audit(1529730023.177:452): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17369 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d9}]}) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 05:00:23 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f0000000040)) 05:00:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) clock_gettime(0x0, &(0x7f00000003c0)) utimensat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', &(0x7f0000000440), 0x0) [ 261.265984] audit: type=1326 audit(1529730023.264:453): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17383 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) 05:00:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) [ 261.384678] audit: type=1326 audit(1529730023.383:454): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17393 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:23 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f0000000040)) 05:00:23 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f0000000040)) 05:00:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6}]}) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 05:00:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 05:00:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) [ 261.955425] audit: type=1326 audit(1529730023.954:455): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17416 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) write$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0xfffffffffffffe9d) 05:00:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) ustat(0x0, &(0x7f00000001c0)) 05:00:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f0000000040)) 05:00:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) 05:00:24 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, &(0x7f0000000240)) 05:00:24 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 05:00:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f0000000040)) 05:00:24 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) rt_sigtimedwait(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)={0x0, 0x989680}, 0x8) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:00:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) clock_gettime(0x0, &(0x7f00000003c0)) utimensat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', &(0x7f0000000440), 0x0) 05:00:24 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 05:00:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) 05:00:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f0000000040)) 05:00:24 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) rt_sigtimedwait(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)={0x0, 0x989680}, 0x8) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:00:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6}]}) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 05:00:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f0000000040)) 05:00:24 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 05:00:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) clock_gettime(0x0, &(0x7f00000003c0)) accept$unix(0xffffffffffffff9c, &(0x7f0000000280), &(0x7f0000000300)=0x6e) 05:00:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) 05:00:25 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) rt_sigtimedwait(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)={0x0, 0x989680}, 0x8) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:00:25 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 05:00:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) 05:00:25 executing program 6: dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 05:00:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) 05:00:25 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) rt_sigtimedwait(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)={0x0, 0x989680}, 0x8) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:00:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) clock_gettime(0x0, &(0x7f00000003c0)) utimensat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', &(0x7f0000000440), 0x0) 05:00:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000000)) 05:00:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) clock_gettime(0x0, &(0x7f00000003c0)) accept$unix(0xffffffffffffff9c, &(0x7f0000000280), &(0x7f0000000300)=0x6e) 05:00:25 executing program 6: dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 05:00:25 executing program 7: syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) 05:00:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6}]}) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 05:00:25 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:00:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) clock_gettime(0x0, &(0x7f00000003c0)) accept$unix(0xffffffffffffff9c, &(0x7f0000000280), &(0x7f0000000300)=0x6e) 05:00:25 executing program 6: dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 05:00:25 executing program 7: syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) 05:00:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f00000003c0)=""/180) 05:00:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f0000000040)) 05:00:25 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 05:00:25 executing program 7: syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) 05:00:25 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:00:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) clock_gettime(0x0, &(0x7f00000003c0)) accept$unix(0xffffffffffffff9c, &(0x7f0000000280), &(0x7f0000000300)=0x6e) 05:00:26 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) 05:00:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f00000003c0)=""/180) 05:00:26 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 05:00:26 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:00:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000040)) 05:00:26 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f0000000040)) 05:00:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) accept$unix(0xffffffffffffff9c, &(0x7f0000000280), &(0x7f0000000300)=0x6e) 05:00:26 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 05:00:26 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) 05:00:26 executing program 5: rt_sigtimedwait(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)={0x0, 0x989680}, 0x8) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:00:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f00000003c0)=""/180) 05:00:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000040)) 05:00:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000080)) [ 264.819768] kauditd_printk_skb: 8 callbacks suppressed [ 264.819790] audit: type=1326 audit(1529730026.818:464): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17585 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:26 executing program 5: rt_sigtimedwait(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)={0x0, 0x989680}, 0x8) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:00:26 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) 05:00:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 05:00:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) accept$unix(0xffffffffffffff9c, &(0x7f0000000280), &(0x7f0000000300)=0x6e) 05:00:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f00000003c0)=""/180) 05:00:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000040)) 05:00:27 executing program 1: r0 = memfd_create(&(0x7f0000000040)='self,\'\x00@\x00', 0x0) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000080)) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000001980)) 05:00:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 05:00:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 05:00:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) 05:00:27 executing program 5: rt_sigtimedwait(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)={0x0, 0x989680}, 0x8) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:00:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) accept$unix(0xffffffffffffff9c, &(0x7f0000000280), &(0x7f0000000300)=0x6e) 05:00:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f00000003c0)=""/180) 05:00:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) socket$inet_udp(0x2, 0x2, 0x0) modify_ldt$write2(0x11, &(0x7f0000000040), 0x10) 05:00:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000040)) 05:00:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) clock_gettime(0x0, &(0x7f00000003c0)) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000480)={'filter\x00', 0x4}, 0x68) 05:00:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) 05:00:27 executing program 5: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) rt_sigtimedwait(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)={0x0, 0x989680}, 0x8) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:00:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505a7}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 05:00:27 executing program 4: clock_gettime(0x0, &(0x7f00000003c0)) accept$unix(0xffffffffffffff9c, &(0x7f0000000280), &(0x7f0000000300)=0x6e) 05:00:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f00000003c0)=""/180) 05:00:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000040)) 05:00:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) stat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) 05:00:28 executing program 5: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) rt_sigtimedwait(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)={0x0, 0x989680}, 0x8) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:00:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) clock_gettime(0x0, &(0x7f00000003c0)) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000480)={'filter\x00', 0x4}, 0x68) 05:00:28 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505a7}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 05:00:28 executing program 4: clock_gettime(0x0, &(0x7f00000003c0)) accept$unix(0xffffffffffffff9c, &(0x7f0000000280), &(0x7f0000000300)=0x6e) 05:00:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) 05:00:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000040)) 05:00:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f00000003c0)=""/180) 05:00:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) stat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) 05:00:28 executing program 5: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) rt_sigtimedwait(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)={0x0, 0x989680}, 0x8) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:00:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) clock_gettime(0x0, &(0x7f00000003c0)) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000480)={'filter\x00', 0x4}, 0x68) 05:00:28 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505a7}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 05:00:28 executing program 4: clock_gettime(0x0, &(0x7f00000003c0)) accept$unix(0xffffffffffffff9c, &(0x7f0000000280), &(0x7f0000000300)=0x6e) 05:00:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000040)) 05:00:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) 05:00:28 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f00000003c0)=""/180) 05:00:28 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) rt_sigtimedwait(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)={0x0, 0x989680}, 0x8) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:00:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) stat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) 05:00:28 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 05:00:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) clock_gettime(0x0, &(0x7f00000003c0)) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000480)={'filter\x00', 0x4}, 0x68) 05:00:28 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) clock_gettime(0x0, &(0x7f00000003c0)) accept$unix(0xffffffffffffff9c, &(0x7f0000000280), &(0x7f0000000300)=0x6e) 05:00:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) 05:00:28 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000040)) [ 266.730109] audit: type=1326 audit(1529730028.728:465): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17722 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:28 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) rt_sigtimedwait(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)={0x0, 0x989680}, 0x8) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:00:28 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f00000003c0)=""/180) 05:00:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) stat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) 05:00:28 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) clock_gettime(0x0, &(0x7f00000003c0)) accept$unix(0xffffffffffffff9c, &(0x7f0000000280), &(0x7f0000000300)=0x6e) 05:00:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000480)={'filter\x00', 0x4}, 0x68) 05:00:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) 05:00:28 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000040)) 05:00:29 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) clock_gettime(0x0, &(0x7f00000003c0)) accept$unix(0xffffffffffffff9c, &(0x7f0000000280), &(0x7f0000000300)=0x6e) 05:00:29 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) rt_sigtimedwait(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)={0x0, 0x989680}, 0x8) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:00:29 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f00000003c0)=""/180) 05:00:29 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000040)) 05:00:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) stat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) 05:00:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 05:00:29 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50280}]}) rt_sigtimedwait(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)={0x0, 0x989680}, 0x8) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:00:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000480)={'filter\x00', 0x4}, 0x68) 05:00:29 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f00000003c0)) accept$unix(0xffffffffffffff9c, &(0x7f0000000280), &(0x7f0000000300)=0x6e) 05:00:29 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000040)) 05:00:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) 05:00:29 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f00000003c0)=""/180) [ 267.687672] audit: type=1326 audit(1529730029.686:466): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17782 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:29 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000040)) 05:00:29 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f00000003c0)) accept$unix(0xffffffffffffff9c, &(0x7f0000000280), &(0x7f0000000300)=0x6e) [ 267.766495] audit: type=1326 audit(1529730029.706:467): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17788 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:29 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f00000003c0)=""/180) 05:00:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000480)={'filter\x00', 0x4}, 0x68) 05:00:29 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50280}]}) rt_sigtimedwait(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)={0x0, 0x989680}, 0x8) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:00:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) stat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) 05:00:29 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f00000003c0)) accept$unix(0xffffffffffffff9c, &(0x7f0000000280), &(0x7f0000000300)=0x6e) 05:00:29 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000040)) 05:00:29 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f00000003c0)=""/180) 05:00:30 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 05:00:30 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50280}]}) rt_sigtimedwait(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)={0x0, 0x989680}, 0x8) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:00:30 executing program 1: clock_gettime(0x0, &(0x7f00000003c0)) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000480)={'filter\x00', 0x4}, 0x68) 05:00:30 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) stat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) 05:00:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50356}]}) clock_gettime(0x0, &(0x7f00000003c0)) accept$unix(0xffffffffffffff9c, &(0x7f0000000280), &(0x7f0000000300)=0x6e) 05:00:30 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000040)) 05:00:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f00000003c0)=""/180) 05:00:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) [ 268.620045] audit: type=1326 audit(1529730030.618:468): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17829 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50356}]}) clock_gettime(0x0, &(0x7f00000003c0)) accept$unix(0xffffffffffffff9c, &(0x7f0000000280), &(0x7f0000000300)=0x6e) [ 268.698610] audit: type=1326 audit(1529730030.676:469): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17837 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f00000003c0)=""/180) 05:00:30 executing program 1: clock_gettime(0x0, &(0x7f00000003c0)) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000480)={'filter\x00', 0x4}, 0x68) 05:00:30 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6}]}) rt_sigtimedwait(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)={0x0, 0x989680}, 0x8) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:00:30 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000040)) 05:00:30 executing program 0: openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) stat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) 05:00:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f00000003c0)=""/180) [ 268.892883] audit: type=1326 audit(1529730030.889:470): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17859 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50356}]}) clock_gettime(0x0, &(0x7f00000003c0)) accept$unix(0xffffffffffffff9c, &(0x7f0000000280), &(0x7f0000000300)=0x6e) 05:00:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) clock_gettime(0x0, &(0x7f00000003c0)) accept$unix(0xffffffffffffff9c, &(0x7f0000000280), &(0x7f0000000300)=0x6e) 05:00:31 executing program 1: clock_gettime(0x0, &(0x7f00000003c0)) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000480)={'filter\x00', 0x4}, 0x68) 05:00:31 executing program 0: openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) stat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) 05:00:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f00000003c0)=""/180) 05:00:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000040)) 05:00:31 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) splice(0xffffffffffffffff, &(0x7f0000000040), 0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000001c0)={0x2d, ""/45}) 05:00:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) [ 269.582689] audit: type=1326 audit(1529730031.581:471): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17884 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:31 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) clock_gettime(0x0, &(0x7f00000003c0)) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000480)={'filter\x00', 0x4}, 0x68) 05:00:31 executing program 0: openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) stat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) 05:00:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f00000003c0)=""/180) 05:00:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000040)) [ 269.693386] audit: type=1326 audit(1529730031.680:472): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17891 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:31 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6}]}) rt_sigtimedwait(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)={0x0, 0x989680}, 0x8) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:00:31 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) stat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) 05:00:31 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) splice(0xffffffffffffffff, &(0x7f0000000040), 0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000001c0)={0x2d, ""/45}) 05:00:31 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) clock_gettime(0x0, &(0x7f00000003c0)) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000480)={'filter\x00', 0x4}, 0x68) 05:00:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000040)) [ 269.939521] audit: type=1326 audit(1529730031.938:473): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17913 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) clock_gettime(0x0, &(0x7f00000003c0)) accept$unix(0xffffffffffffff9c, &(0x7f0000000280), &(0x7f0000000300)=0x6e) 05:00:32 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f00000003c0)=""/180) 05:00:32 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) stat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) 05:00:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000040)) 05:00:32 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) clock_gettime(0x0, &(0x7f00000003c0)) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000480)={'filter\x00', 0x4}, 0x68) 05:00:32 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) splice(0xffffffffffffffff, &(0x7f0000000040), 0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000001c0)={0x2d, ""/45}) [ 270.529563] audit: type=1326 audit(1529730032.528:474): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17929 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000040)) 05:00:32 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) stat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) 05:00:32 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) tgkill(0x0, 0x0, 0x0) 05:00:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f00000003c0)) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000480)={'filter\x00', 0x4}, 0x68) 05:00:32 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f00000003c0)=""/180) [ 270.678096] audit: type=1326 audit(1529730032.676:475): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17945 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 270.773477] audit: type=1326 audit(1529730032.769:476): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17955 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:32 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6}]}) rt_sigtimedwait(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)={0x0, 0x989680}, 0x8) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:00:32 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) splice(0xffffffffffffffff, &(0x7f0000000040), 0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000001c0)={0x2d, ""/45}) 05:00:32 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) stat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) 05:00:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f00000003c0)) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000480)={'filter\x00', 0x4}, 0x68) 05:00:32 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) tgkill(0x0, 0x0, 0x0) [ 270.900371] audit: type=1326 audit(1529730032.899:477): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17965 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) clock_gettime(0x0, &(0x7f00000003c0)) accept$unix(0xffffffffffffff9c, &(0x7f0000000280), &(0x7f0000000300)=0x6e) 05:00:33 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) stat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) 05:00:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f00000003c0)) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000480)={'filter\x00', 0x4}, 0x68) 05:00:33 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000001c0)={0x2d, ""/45}) 05:00:33 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) tgkill(0x0, 0x0, 0x0) 05:00:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50356}]}) clock_gettime(0x0, &(0x7f00000003c0)) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000480)={'filter\x00', 0x4}, 0x68) [ 271.470587] audit: type=1326 audit(1529730033.469:478): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17988 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000040)) 05:00:33 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) stat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) 05:00:33 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000001c0)={0x2d, ""/45}) 05:00:33 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) tgkill(0x0, 0x0, 0x0) 05:00:33 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f00000003c0)=""/180) [ 271.710728] audit: type=1326 audit(1529730033.709:479): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18007 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 271.782506] audit: type=1326 audit(1529730033.781:480): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18010 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:33 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000001c0)={0x2d, ""/45}) 05:00:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50356}]}) clock_gettime(0x0, &(0x7f00000003c0)) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000480)={'filter\x00', 0x4}, 0x68) 05:00:33 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) tgkill(0x0, 0x0, 0x0) 05:00:33 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) stat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) 05:00:33 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d9}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000100)=@abs, 0x6e, &(0x7f0000000400), 0x0, &(0x7f0000000980)}, 0x0) 05:00:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d9}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000100)=@abs, 0x6e, &(0x7f0000000400), 0x0, &(0x7f0000000980)}, 0x0) 05:00:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50356}]}) clock_gettime(0x0, &(0x7f00000003c0)) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000480)={'filter\x00', 0x4}, 0x68) 05:00:34 executing program 6: splice(0xffffffffffffffff, &(0x7f0000000040), 0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000001c0)={0x2d, ""/45}) 05:00:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) stat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) 05:00:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) tgkill(0x0, 0x0, 0x0) 05:00:34 executing program 4: 05:00:34 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000040)) 05:00:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) stat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) 05:00:34 executing program 6: splice(0xffffffffffffffff, &(0x7f0000000040), 0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000001c0)={0x2d, ""/45}) 05:00:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) clock_gettime(0x0, &(0x7f00000003c0)) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000480)={'filter\x00', 0x4}, 0x68) [ 272.641994] audit: type=1326 audit(1529730034.640:481): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18055 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:34 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) socket$unix(0x1, 0x0, 0x0) 05:00:34 executing program 6: splice(0xffffffffffffffff, &(0x7f0000000040), 0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000001c0)={0x2d, ""/45}) 05:00:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) tgkill(0x0, 0x0, 0x0) 05:00:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d9}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000100)=@abs, 0x6e, &(0x7f0000000400), 0x0, &(0x7f0000000980)}, 0x0) 05:00:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f00000003c0)=""/180) 05:00:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) stat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) [ 272.681607] audit: type=1326 audit(1529730034.668:482): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18058 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:34 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) splice(0xffffffffffffffff, &(0x7f0000000040), 0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000001c0)={0x2d, ""/45}) 05:00:34 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) sync() sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)=@gettfilter={0x24, 0x2e}, 0x24}, 0x1}, 0x0) 05:00:34 executing program 7: openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) tgkill(0x0, 0x0, 0x0) 05:00:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d9}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000100)=@abs, 0x6e, &(0x7f0000000400), 0x0, &(0x7f0000000980)}, 0x0) 05:00:35 executing program 7: openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) tgkill(0x0, 0x0, 0x0) 05:00:35 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) splice(0xffffffffffffffff, &(0x7f0000000040), 0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000001c0)={0x2d, ""/45}) 05:00:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) clock_gettime(0x0, &(0x7f00000003c0)) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000480)={'filter\x00', 0x4}, 0x68) 05:00:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d9}]}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000100)=@abs, 0x6e, &(0x7f0000000400), 0x0, &(0x7f0000000980)}, 0x0) 05:00:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) sync() sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)=@gettfilter={0x24, 0x2e}, 0x24}, 0x1}, 0x0) 05:00:35 executing program 7: openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) tgkill(0x0, 0x0, 0x0) 05:00:35 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) splice(0xffffffffffffffff, &(0x7f0000000040), 0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000001c0)={0x2d, ""/45}) 05:00:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) sync() sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)=@gettfilter={0x24, 0x2e}, 0x24}, 0x1}, 0x0) 05:00:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50353}]}) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000200)) 05:00:35 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) tgkill(0x0, 0x0, 0x0) 05:00:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) splice(0xffffffffffffffff, &(0x7f0000000040), 0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000001c0)={0x2d, ""/45}) 05:00:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) stat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) 05:00:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) 05:00:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d9}]}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000100)=@abs, 0x6e, &(0x7f0000000400), 0x0, &(0x7f0000000980)}, 0x0) 05:00:35 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) tgkill(0x0, 0x0, 0x0) 05:00:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) splice(0xffffffffffffffff, &(0x7f0000000040), 0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000001c0)={0x2d, ""/45}) 05:00:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) sync() sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)=@gettfilter={0x24, 0x2e}, 0x24}, 0x1}, 0x0) 05:00:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d9}]}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000100)=@abs, 0x6e, &(0x7f0000000400), 0x0, &(0x7f0000000980)}, 0x0) 05:00:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) clock_gettime(0x0, &(0x7f00000003c0)) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000480)={'filter\x00', 0x4}, 0x68) 05:00:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50353}]}) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000200)) 05:00:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) 05:00:36 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) tgkill(0x0, 0x0, 0x0) 05:00:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) splice(0xffffffffffffffff, &(0x7f0000000040), 0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000001c0)={0x2d, ""/45}) 05:00:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)=@gettfilter={0x24, 0x2e}, 0x24}, 0x1}, 0x0) 05:00:36 executing program 5: openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000100)=@abs, 0x6e, &(0x7f0000000400), 0x0, &(0x7f0000000980)}, 0x0) 05:00:36 executing program 5: openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000100)=@abs, 0x6e, &(0x7f0000000400), 0x0, &(0x7f0000000980)}, 0x0) 05:00:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]}) splice(0xffffffffffffffff, &(0x7f0000000040), 0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000001c0)={0x2d, ""/45}) 05:00:36 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) stat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) 05:00:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) tgkill(0x0, 0x0, 0x0) 05:00:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)=@gettfilter={0x24, 0x2e}, 0x24}, 0x1}, 0x0) 05:00:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50353}]}) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000200)) 05:00:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) 05:00:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]}) splice(0xffffffffffffffff, &(0x7f0000000040), 0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000001c0)={0x2d, ""/45}) 05:00:36 executing program 5: openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000100)=@abs, 0x6e, &(0x7f0000000400), 0x0, &(0x7f0000000980)}, 0x0) 05:00:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50353}]}) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000200)) 05:00:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]}) splice(0xffffffffffffffff, &(0x7f0000000040), 0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000001c0)={0x2d, ""/45}) 05:00:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)=@gettfilter={0x24, 0x2e}, 0x24}, 0x1}, 0x0) 05:00:37 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d9}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000100)=@abs, 0x6e, &(0x7f0000000400), 0x0, &(0x7f0000000980)}, 0x0) 05:00:37 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) 05:00:37 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) tgkill(0x0, 0x0, 0x0) 05:00:37 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)) sync() 05:00:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) splice(0xffffffffffffffff, &(0x7f0000000040), 0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000001c0)={0x2d, ""/45}) 05:00:37 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d9}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000100)=@abs, 0x6e, &(0x7f0000000400), 0x0, &(0x7f0000000980)}, 0x0) [ 275.668978] kauditd_printk_skb: 6 callbacks suppressed [ 275.669001] audit: type=1326 audit(1529730037.667:489): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18228 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:37 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d9}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000100)=@abs, 0x6e, &(0x7f0000000400), 0x0, &(0x7f0000000980)}, 0x0) 05:00:37 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)) sync() 05:00:37 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) 05:00:37 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) tgkill(0x0, 0x0, 0x0) 05:00:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50353}]}) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000200)) 05:00:37 executing program 4: sync() sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)=@gettfilter={0x24, 0x2e}, 0x24}, 0x1}, 0x0) 05:00:37 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50235}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 05:00:37 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) tgkill(0x0, 0x0, 0x0) 05:00:37 executing program 4: sync() sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)=@gettfilter={0x24, 0x2e}, 0x24}, 0x1}, 0x0) 05:00:37 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000280)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000100)=@abs, 0x6e, &(0x7f0000000400), 0x0, &(0x7f0000000980)}, 0x0) 05:00:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50353}]}) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000200)) 05:00:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) 05:00:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)) sync() 05:00:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) tgkill(0x0, 0x0, 0x0) 05:00:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) splice(0xffffffffffffffff, &(0x7f0000000040), 0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000001c0)={0x2d, ""/45}) 05:00:38 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50235}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 05:00:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000280)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000100)=@abs, 0x6e, &(0x7f0000000400), 0x0, &(0x7f0000000980)}, 0x0) 05:00:38 executing program 4: sync() sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)=@gettfilter={0x24, 0x2e}, 0x24}, 0x1}, 0x0) 05:00:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50353}]}) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000200)) 05:00:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) 05:00:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)) sync() 05:00:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) tgkill(0x0, 0x0, 0x0) 05:00:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000280)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000100)=@abs, 0x6e, &(0x7f0000000400), 0x0, &(0x7f0000000980)}, 0x0) [ 276.649653] audit: type=1326 audit(1529730038.648:490): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18283 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) tgkill(0x0, 0x0, 0x0) 05:00:38 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) sync() sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)=@gettfilter={0x24, 0x2e}, 0x24}, 0x1}, 0x0) 05:00:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) sync() 05:00:38 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000200)) 05:00:38 executing program 3: dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) 05:00:38 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50235}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) [ 276.798350] audit: type=1326 audit(1529730038.797:491): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18302 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d9}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000100)=@abs, 0x6e, &(0x7f0000000400), 0x0, &(0x7f0000000980)}, 0x0) 05:00:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) splice(0xffffffffffffffff, &(0x7f0000000040), 0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000001c0)={0x2d, ""/45}) 05:00:39 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000200)) 05:00:39 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) sync() sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)=@gettfilter={0x24, 0x2e}, 0x24}, 0x1}, 0x0) 05:00:39 executing program 3: dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) 05:00:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) sync() 05:00:39 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50235}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 05:00:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d9}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000100)=@abs, 0x6e, &(0x7f0000000400), 0x0, &(0x7f0000000980)}, 0x0) 05:00:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d9}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000100)=@abs, 0x6e, &(0x7f0000000400), 0x0, &(0x7f0000000980)}, 0x0) [ 277.619394] audit: type=1326 audit(1529730039.618:492): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18329 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:39 executing program 3: dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) 05:00:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) tgkill(0x0, 0x0, 0x0) 05:00:39 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000200)) 05:00:39 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) sync() sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)=@gettfilter={0x24, 0x2e}, 0x24}, 0x1}, 0x0) 05:00:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) sync() 05:00:39 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50235}]}) sendmsg$key(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 05:00:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000100)=@abs, 0x6e, &(0x7f0000000400), 0x0, &(0x7f0000000980)}, 0x0) 05:00:39 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) [ 277.902046] audit: type=1326 audit(1529730039.900:493): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18362 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 277.989193] audit: type=1326 audit(1529730039.983:494): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18367 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:40 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) 05:00:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) sync() sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)=@gettfilter={0x24, 0x2e}, 0x24}, 0x1}, 0x0) 05:00:40 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50353}]}) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000200)) 05:00:40 executing program 1: seccomp(0x0, 0x0, &(0x7f00000001c0)) sync() 05:00:40 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50235}]}) sendmsg$key(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 05:00:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getpid() wait4(0x0, 0x0, 0x0, &(0x7f0000000280)) 05:00:40 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50353}]}) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000200)) 05:00:40 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) 05:00:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) sync() sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)=@gettfilter={0x24, 0x2e}, 0x24}, 0x1}, 0x0) 05:00:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) tgkill(0x0, 0x0, 0x0) 05:00:40 executing program 1: seccomp(0x0, 0x0, &(0x7f00000001c0)) sync() 05:00:40 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50235}]}) sendmsg$key(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 05:00:40 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50353}]}) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000200)) 05:00:40 executing program 6: 05:00:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000100)=@abs, 0x6e, &(0x7f0000000400), 0x0, &(0x7f0000000980)}, 0x0) 05:00:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) sync() sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)=@gettfilter={0x24, 0x2e}, 0x24}, 0x1}, 0x0) 05:00:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) 05:00:40 executing program 6: 05:00:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000200)) [ 278.909363] audit: type=1326 audit(1529730040.907:495): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18415 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:41 executing program 1: seccomp(0x0, 0x0, &(0x7f00000001c0)) sync() 05:00:41 executing program 0: dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 05:00:41 executing program 6: [ 279.055348] audit: type=1326 audit(1529730041.053:496): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18427 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:41 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) 05:00:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) sync() sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)=@gettfilter={0x24, 0x2e}, 0x24}, 0x1}, 0x0) 05:00:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000200)) 05:00:41 executing program 0: dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 05:00:41 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)) sync() 05:00:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000200)) 05:00:41 executing program 6: 05:00:41 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) 05:00:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000100)=@abs, 0x6e, &(0x7f0000000400), 0x0, &(0x7f0000000980)}, 0x0) 05:00:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) sync() sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)=@gettfilter={0x24, 0x2e}, 0x24}, 0x1}, 0x0) 05:00:41 executing program 7: 05:00:41 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) 05:00:41 executing program 6: 05:00:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50353}]}) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000200)) 05:00:41 executing program 0: dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 05:00:41 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)) sync() 05:00:42 executing program 7: 05:00:42 executing program 6: 05:00:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50353}]}) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000200)) [ 280.079777] audit: type=1326 audit(1529730042.078:497): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18481 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) 05:00:42 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)) sync() 05:00:42 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50235}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 05:00:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) sync() sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)=@gettfilter={0x24, 0x2e}, 0x24}, 0x1}, 0x0) 05:00:42 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x10) 05:00:42 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x10) 05:00:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50353}]}) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000200)) 05:00:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) dup(0xffffffffffffffff) keyctl$set_timeout(0xf, 0x0, 0x0) 05:00:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000004240)=""/199, &(0x7f0000000000)=0xc7) 05:00:42 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50235}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 05:00:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) 05:00:42 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) seccomp(0x0, 0x0, &(0x7f00000001c0)) sync() 05:00:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) sync() sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)=@gettfilter={0x24, 0x2e}, 0x24}, 0x1}, 0x0) [ 280.999858] audit: type=1326 audit(1529730042.998:498): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18524 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) 05:00:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000200)) 05:00:43 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50235}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 05:00:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) seccomp(0x0, 0x0, &(0x7f00000001c0)) sync() 05:00:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x10) [ 281.171293] audit: type=1326 audit(1529730043.170:499): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18538 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000004240)=""/199, &(0x7f0000000000)=0xc7) 05:00:43 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) dup(0xffffffffffffffff) keyctl$set_timeout(0xf, 0x0, 0x0) [ 281.249480] audit: type=1326 audit(1529730043.231:500): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18542 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:43 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 05:00:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) seccomp(0x0, 0x0, &(0x7f00000001c0)) sync() 05:00:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x10) 05:00:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000004240)=""/199, &(0x7f0000000000)=0xc7) 05:00:43 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 05:00:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)) sync() 05:00:43 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) dup(0xffffffffffffffff) keyctl$set_timeout(0xf, 0x0, 0x0) 05:00:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x10) 05:00:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) sync() sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)=@gettfilter={0x24, 0x2e}, 0x24}, 0x1}, 0x0) [ 281.930485] audit: type=1326 audit(1529730043.929:501): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18587 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) 05:00:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000004240)=""/199, &(0x7f0000000000)=0xc7) 05:00:44 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 05:00:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)) sync() 05:00:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) dup(0xffffffffffffffff) keyctl$set_timeout(0xf, 0x0, 0x0) 05:00:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x10) 05:00:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000200)) [ 282.169832] audit: type=1326 audit(1529730044.168:502): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18597 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:44 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50235}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 05:00:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000004240)=""/199, &(0x7f0000000000)=0xc7) [ 282.227493] audit: type=1326 audit(1529730044.219:503): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18602 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x10) 05:00:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)) sync() 05:00:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) keyctl$set_timeout(0xf, 0x0, 0x0) 05:00:44 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50235}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 05:00:44 executing program 7: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x10) 05:00:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000004240)=""/199, &(0x7f0000000000)=0xc7) 05:00:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) sync() sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)=@gettfilter={0x24, 0x2e}, 0x24}, 0x1}, 0x0) [ 282.859802] audit: type=1326 audit(1529730044.858:504): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18638 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) 05:00:45 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50235}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 05:00:45 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)) sync() 05:00:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) keyctl$set_timeout(0xf, 0x0, 0x0) 05:00:45 executing program 7: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x10) 05:00:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000004240)=""/199, &(0x7f0000000000)=0xc7) 05:00:45 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000200)) [ 283.112509] audit: type=1326 audit(1529730045.111:505): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18643 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:45 executing program 7: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x10) 05:00:45 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) [ 283.174769] audit: type=1326 audit(1529730045.146:506): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18644 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 283.194624] audit: type=1326 audit(1529730045.159:507): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18652 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:45 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000004240)=""/199, &(0x7f0000000000)=0xc7) 05:00:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) keyctl$set_timeout(0xf, 0x0, 0x0) 05:00:45 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x10) 05:00:45 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000004240)=""/199, &(0x7f0000000000)=0xc7) 05:00:45 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x10) 05:00:45 executing program 6: dup(0xffffffffffffffff) keyctl$set_timeout(0xf, 0x0, 0x0) 05:00:45 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x10) 05:00:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)) sync() 05:00:46 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000004240)=""/199, &(0x7f0000000000)=0xc7) 05:00:46 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f00000008c0), 0x0, 0x0) 05:00:46 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) pkey_free(0xffffffffffffffff) 05:00:46 executing program 6: dup(0xffffffffffffffff) keyctl$set_timeout(0xf, 0x0, 0x0) 05:00:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x10) 05:00:46 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000040)='./file1\x00'}, 0x10) 05:00:46 executing program 6: dup(0xffffffffffffffff) keyctl$set_timeout(0xf, 0x0, 0x0) 05:00:46 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 05:00:46 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000004240)=""/199, &(0x7f0000000000)=0xc7) 05:00:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x10) 05:00:46 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) dup(0xffffffffffffffff) keyctl$set_timeout(0xf, 0x0, 0x0) 05:00:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x10) 05:00:46 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) pkey_free(0xffffffffffffffff) 05:00:46 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000040)='./file1\x00'}, 0x10) 05:00:46 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f00000008c0), 0x0, 0x0) 05:00:47 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)) sync() 05:00:47 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000004240)=""/199, &(0x7f0000000000)=0xc7) 05:00:47 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x5002e}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x10) 05:00:47 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) dup(0xffffffffffffffff) keyctl$set_timeout(0xf, 0x0, 0x0) 05:00:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000040)='./file1\x00'}, 0x10) 05:00:47 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) pkey_free(0xffffffffffffffff) 05:00:47 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f00000008c0), 0x0, 0x0) 05:00:47 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000004240)=""/199, &(0x7f0000000000)=0xc7) 05:00:47 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 05:00:47 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x5002e}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x10) 05:00:47 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) dup(0xffffffffffffffff) keyctl$set_timeout(0xf, 0x0, 0x0) 05:00:47 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) pkey_free(0xffffffffffffffff) 05:00:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000040)='./file1\x00'}, 0x10) 05:00:47 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f00000008c0), 0x0, 0x0) 05:00:47 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000004240)=""/199, &(0x7f0000000000)=0xc7) 05:00:47 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) dup(0xffffffffffffffff) keyctl$set_timeout(0xf, 0x0, 0x0) 05:00:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) pkey_free(0xffffffffffffffff) 05:00:48 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x5002e}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x10) 05:00:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) memfd_create(&(0x7f0000000000)="70707031df706f7369785f61636c5f61636365737300", 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000300)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 05:00:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) sendmmsg$alg(0xffffffffffffffff, &(0x7f00000008c0), 0x0, 0x0) 05:00:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000004240)=""/199, &(0x7f0000000000)=0xc7) 05:00:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000040)='./file1\x00'}, 0x10) 05:00:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) dup(0xffffffffffffffff) keyctl$set_timeout(0xf, 0x0, 0x0) 05:00:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000004240)=""/199, &(0x7f0000000000)=0xc7) 05:00:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) sendmmsg$alg(0xffffffffffffffff, &(0x7f00000008c0), 0x0, 0x0) 05:00:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) dup(0xffffffffffffffff) keyctl$set_timeout(0xf, 0x0, 0x0) 05:00:48 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x10) 05:00:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) pkey_free(0xffffffffffffffff) 05:00:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000040)='./file1\x00'}, 0x10) 05:00:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000004240)=""/199, &(0x7f0000000000)=0xc7) 05:00:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:00:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) memfd_create(&(0x7f0000000000)="70707031df706f7369785f61636c5f61636365737300", 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000300)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) [ 286.328602] kauditd_printk_skb: 5 callbacks suppressed [ 286.328624] audit: type=1326 audit(1529730048.327:513): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18826 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]}) dup(0xffffffffffffffff) keyctl$set_timeout(0xf, 0x0, 0x0) 05:00:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000004240)=""/199, &(0x7f0000000000)=0xc7) 05:00:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) pkey_free(0xffffffffffffffff) 05:00:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:00:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) sendmmsg$alg(0xffffffffffffffff, &(0x7f00000008c0), 0x0, 0x0) 05:00:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000040)='./file1\x00'}, 0x10) 05:00:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) memfd_create(&(0x7f0000000000)="70707031df706f7369785f61636c5f61636365737300", 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000300)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 05:00:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]}) dup(0xffffffffffffffff) keyctl$set_timeout(0xf, 0x0, 0x0) 05:00:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000004240)=""/199, &(0x7f0000000000)=0xc7) 05:00:48 executing program 4: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) pkey_free(0xffffffffffffffff) 05:00:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x10) 05:00:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:00:49 executing program 3: msgget$private(0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f00000008c0), 0x0, 0x0) 05:00:49 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000040)='./file1\x00'}, 0x10) 05:00:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000004240)=""/199, &(0x7f0000000000)=0xc7) 05:00:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]}) dup(0xffffffffffffffff) keyctl$set_timeout(0xf, 0x0, 0x0) 05:00:49 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) memfd_create(&(0x7f0000000000)="70707031df706f7369785f61636c5f61636365737300", 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000300)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 05:00:49 executing program 4: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) pkey_free(0xffffffffffffffff) [ 287.279370] audit: type=1326 audit(1529730049.278:514): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18881 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:49 executing program 3: msgget$private(0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f00000008c0), 0x0, 0x0) [ 287.318266] audit: type=1326 audit(1529730049.298:515): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18890 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:49 executing program 4: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) pkey_free(0xffffffffffffffff) 05:00:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) dup(0xffffffffffffffff) keyctl$set_timeout(0xf, 0x0, 0x0) 05:00:49 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000040)='./file1\x00'}, 0x10) 05:00:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:00:49 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000300)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 05:00:49 executing program 3: msgget$private(0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f00000008c0), 0x0, 0x0) [ 287.510646] audit: type=1326 audit(1529730049.509:516): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18904 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:49 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) pkey_free(0xffffffffffffffff) 05:00:50 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x10) 05:00:50 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000040)='./file1\x00'}, 0x10) 05:00:50 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f00000008c0), 0x0, 0x0) 05:00:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 288.184624] audit: type=1326 audit(1529730050.183:517): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18928 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000004240)=""/199, &(0x7f0000000000)=0xc7) 05:00:50 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000300)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 05:00:50 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) pkey_free(0xffffffffffffffff) 05:00:50 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000040)='./file1\x00'}, 0x10) 05:00:50 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f00000008c0), 0x0, 0x0) [ 288.333510] audit: type=1326 audit(1529730050.332:518): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18943 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:50 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) pkey_free(0xffffffffffffffff) 05:00:50 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) dup(0xffffffffffffffff) keyctl$set_timeout(0xf, 0x0, 0x0) 05:00:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:00:50 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000040)='./file1\x00'}, 0x10) 05:00:50 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000300)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 05:00:50 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f00000008c0), 0x0, 0x0) 05:00:50 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) pkey_free(0xffffffffffffffff) [ 288.569835] audit: type=1326 audit(1529730050.568:519): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18962 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:51 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:00:51 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000040)='./file1\x00'}, 0x10) 05:00:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) msgget$private(0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f00000008c0), 0x0, 0x0) 05:00:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) pkey_free(0xffffffffffffffff) 05:00:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000004240)=""/199, &(0x7f0000000000)=0xc7) 05:00:51 executing program 1: memfd_create(&(0x7f0000000000)="70707031df706f7369785f61636c5f61636365737300", 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000300)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 05:00:51 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000300), 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@nfc, 0x80, &(0x7f0000000900), 0x0, &(0x7f00000009c0)=""/4096, 0x1000}, 0x0) 05:00:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) msgget$private(0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f00000008c0), 0x0, 0x0) 05:00:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000040)='./file1\x00'}, 0x10) 05:00:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) pkey_free(0xffffffffffffffff) [ 289.320091] audit: type=1326 audit(1529730051.318:520): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18999 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:51 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) dup(0xffffffffffffffff) keyctl$set_timeout(0xf, 0x0, 0x0) 05:00:51 executing program 0: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:00:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) pkey_free(0xffffffffffffffff) 05:00:51 executing program 1: memfd_create(&(0x7f0000000000)="70707031df706f7369785f61636c5f61636365737300", 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000300)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 05:00:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000040)='./file1\x00'}, 0x10) 05:00:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) msgget$private(0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f00000008c0), 0x0, 0x0) 05:00:51 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000300), 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@nfc, 0x80, &(0x7f0000000900), 0x0, &(0x7f00000009c0)=""/4096, 0x1000}, 0x0) 05:00:51 executing program 0: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 289.562635] audit: type=1326 audit(1529730051.561:521): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19024 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) pkey_free(0xffffffffffffffff) 05:00:51 executing program 1: memfd_create(&(0x7f0000000000)="70707031df706f7369785f61636c5f61636365737300", 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000300)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 05:00:52 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) memfd_create(&(0x7f0000000000)="70707031df706f7369785f61636c5f61636365737300", 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000300)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 05:00:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000040)='./file1\x00'}, 0x10) 05:00:52 executing program 0: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:00:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f00000008c0), 0x0, 0x0) 05:00:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) pkey_free(0xffffffffffffffff) 05:00:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000300), 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@nfc, 0x80, &(0x7f0000000900), 0x0, &(0x7f00000009c0)=""/4096, 0x1000}, 0x0) 05:00:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000300), 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@nfc, 0x80, &(0x7f0000000900), 0x0, &(0x7f00000009c0)=""/4096, 0x1000}, 0x0) 05:00:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x14}, 0x14}, 0x1}, 0x0) 05:00:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f00000008c0), 0x0, 0x0) 05:00:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50259}]}) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000040)='./file1\x00'}, 0x10) 05:00:52 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:00:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) pkey_free(0xffffffffffffffff) 05:00:52 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) memfd_create(&(0x7f0000000000)="70707031df706f7369785f61636c5f61636365737300", 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000300)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 05:00:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@rand_addr, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in=@dev={0xac, 0x14, 0x14}}}, 0xe8) [ 290.509920] audit: type=1326 audit(1529730052.508:522): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19070 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:52 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:00:52 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) memfd_create(&(0x7f0000000000)="70707031df706f7369785f61636c5f61636365737300", 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000300)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 05:00:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50259}]}) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000040)='./file1\x00'}, 0x10) 05:00:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f00000008c0), 0x0, 0x0) 05:00:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) recvmsg(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@nfc, 0x80, &(0x7f0000000900), 0x0, &(0x7f00000009c0)=""/4096, 0x1000}, 0x0) 05:00:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x14}, 0x14}, 0x1}, 0x0) 05:00:52 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) memfd_create(&(0x7f0000000000)="70707031df706f7369785f61636c5f61636365737300", 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000300)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 05:00:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@rand_addr, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in=@dev={0xac, 0x14, 0x14}}}, 0xe8) 05:00:52 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:00:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50259}]}) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000040)='./file1\x00'}, 0x10) 05:00:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) msgget$private(0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f00000008c0), 0x0, 0x0) 05:00:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) recvmsg(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@nfc, 0x80, &(0x7f0000000900), 0x0, &(0x7f00000009c0)=""/4096, 0x1000}, 0x0) 05:00:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x14}, 0x14}, 0x1}, 0x0) 05:00:53 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) pkey_free(0xffffffffffffffff) 05:00:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) memfd_create(&(0x7f0000000000)="70707031df706f7369785f61636c5f61636365737300", 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000300)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 05:00:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:00:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@rand_addr, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in=@dev={0xac, 0x14, 0x14}}}, 0xe8) 05:00:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000040)='./file1\x00'}, 0x10) 05:00:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) recvmsg(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@nfc, 0x80, &(0x7f0000000900), 0x0, &(0x7f00000009c0)=""/4096, 0x1000}, 0x0) 05:00:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x14}, 0x14}, 0x1}, 0x0) [ 291.416907] kauditd_printk_skb: 1 callbacks suppressed [ 291.416931] audit: type=1326 audit(1529730053.415:524): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19127 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) memfd_create(&(0x7f0000000000)="70707031df706f7369785f61636c5f61636365737300", 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000300)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 05:00:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 291.536131] audit: type=1326 audit(1529730053.459:525): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19130 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:53 executing program 7: pipe2(&(0x7f0000000300), 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@nfc, 0x80, &(0x7f0000000900), 0x0, &(0x7f00000009c0)=""/4096, 0x1000}, 0x0) 05:00:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@rand_addr, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in=@dev={0xac, 0x14, 0x14}}}, 0xe8) 05:00:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x14}, 0x14}, 0x1}, 0x0) 05:00:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50030}]}) memfd_create(&(0x7f0000000000)="70707031df706f7369785f61636c5f61636365737300", 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000300)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 05:00:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) msgget$private(0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f00000008c0), 0x0, 0x0) 05:00:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:00:53 executing program 7: pipe2(&(0x7f0000000300), 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@nfc, 0x80, &(0x7f0000000900), 0x0, &(0x7f00000009c0)=""/4096, 0x1000}, 0x0) [ 291.932815] audit: type=1326 audit(1529730053.931:526): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19171 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:54 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) pkey_free(0xffffffffffffffff) 05:00:54 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50030}]}) memfd_create(&(0x7f0000000000)="70707031df706f7369785f61636c5f61636365737300", 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000300)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 05:00:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x14}, 0x14}, 0x1}, 0x0) 05:00:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@rand_addr, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in=@dev={0xac, 0x14, 0x14}}}, 0xe8) 05:00:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000040)='./file1\x00'}, 0x10) 05:00:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:00:54 executing program 7: pipe2(&(0x7f0000000300), 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@nfc, 0x80, &(0x7f0000000900), 0x0, &(0x7f00000009c0)=""/4096, 0x1000}, 0x0) [ 292.381023] audit: type=1326 audit(1529730054.379:527): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19183 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:54 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50030}]}) memfd_create(&(0x7f0000000000)="70707031df706f7369785f61636c5f61636365737300", 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000300)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 05:00:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@rand_addr, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in=@dev={0xac, 0x14, 0x14}}}, 0xe8) 05:00:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x14}, 0x14}, 0x1}, 0x0) [ 292.461125] audit: type=1326 audit(1529730054.458:528): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19190 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:00:54 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000300), 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@nfc, 0x80, &(0x7f0000000900), 0x0, &(0x7f00000009c0)=""/4096, 0x1000}, 0x0) 05:00:54 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) memfd_create(&(0x7f0000000000)="70707031df706f7369785f61636c5f61636365737300", 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000300)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) [ 292.665700] audit: type=1326 audit(1529730054.664:529): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19207 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) msgget$private(0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f00000008c0), 0x0, 0x0) 05:00:54 executing program 5: pipe2(&(0x7f0000000040), 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x14}, 0x14}, 0x1}, 0x0) 05:00:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 292.880735] audit: type=1326 audit(1529730054.879:530): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19221 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:55 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:00:55 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@rand_addr, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in=@dev={0xac, 0x14, 0x14}}}, 0xe8) 05:00:55 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000300), 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@nfc, 0x80, &(0x7f0000000900), 0x0, &(0x7f00000009c0)=""/4096, 0x1000}, 0x0) 05:00:55 executing program 5: pipe2(&(0x7f0000000040), 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x14}, 0x14}, 0x1}, 0x0) [ 293.325241] audit: type=1326 audit(1529730055.323:531): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19230 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000040)='./file1\x00'}, 0x10) 05:00:55 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) pipe(&(0x7f00000000c0)) personality(0x0) 05:00:55 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000300), 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@nfc, 0x80, &(0x7f0000000900), 0x0, &(0x7f00000009c0)=""/4096, 0x1000}, 0x0) 05:00:55 executing program 5: pipe2(&(0x7f0000000040), 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x14}, 0x14}, 0x1}, 0x0) 05:00:55 executing program 6: socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@rand_addr, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in=@dev={0xac, 0x14, 0x14}}}, 0xe8) [ 293.449952] audit: type=1326 audit(1529730055.449:532): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19242 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:55 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x14}, 0x14}, 0x1}, 0x0) 05:00:55 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}) pipe2(&(0x7f0000000300), 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@nfc, 0x80, &(0x7f0000000900), 0x0, &(0x7f00000009c0)=""/4096, 0x1000}, 0x0) 05:00:55 executing program 6: socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@rand_addr, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in=@dev={0xac, 0x14, 0x14}}}, 0xe8) 05:00:55 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) memfd_create(&(0x7f0000000000)="70707031df706f7369785f61636c5f61636365737300", 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000300)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) [ 293.715631] audit: type=1326 audit(1529730055.714:533): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19264 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:55 executing program 6: socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@rand_addr, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in=@dev={0xac, 0x14, 0x14}}}, 0xe8) 05:00:55 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) pipe(&(0x7f00000000c0)) personality(0x0) 05:00:55 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x14}, 0x14}, 0x1}, 0x0) 05:00:56 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:00:56 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}) pipe2(&(0x7f0000000300), 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@nfc, 0x80, &(0x7f0000000900), 0x0, &(0x7f00000009c0)=""/4096, 0x1000}, 0x0) 05:00:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240), &(0x7f00000005c0)}, 0x28) 05:00:56 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@rand_addr, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in=@dev={0xac, 0x14, 0x14}}}, 0xe8) 05:00:56 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@rand_addr, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in=@dev={0xac, 0x14, 0x14}}}, 0xe8) 05:00:56 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x14}, 0x14}, 0x1}, 0x0) 05:00:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) pipe(&(0x7f00000000c0)) personality(0x0) 05:00:56 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}) pipe2(&(0x7f0000000300), 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@nfc, 0x80, &(0x7f0000000900), 0x0, &(0x7f00000009c0)=""/4096, 0x1000}, 0x0) 05:00:56 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) 05:00:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240), &(0x7f00000005c0)}, 0x28) 05:00:56 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000040), 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x14}, 0x14}, 0x1}, 0x0) 05:00:56 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@rand_addr, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in=@dev={0xac, 0x14, 0x14}}}, 0xe8) 05:00:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) memfd_create(&(0x7f0000000000)="70707031df706f7369785f61636c5f61636365737300", 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000300)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 05:00:56 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000300), 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@nfc, 0x80, &(0x7f0000000900), 0x0, &(0x7f00000009c0)=""/4096, 0x1000}, 0x0) 05:00:56 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) 05:00:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) pipe(&(0x7f00000000c0)) personality(0x0) 05:00:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:00:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000040), 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x14}, 0x14}, 0x1}, 0x0) 05:00:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@rand_addr, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in=@dev={0xac, 0x14, 0x14}}}, 0xe8) 05:00:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240), &(0x7f00000005c0)}, 0x28) 05:00:57 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000300), 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@nfc, 0x80, &(0x7f0000000900), 0x0, &(0x7f00000009c0)=""/4096, 0x1000}, 0x0) 05:00:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) personality(0x0) 05:00:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) 05:00:57 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000300), 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@nfc, 0x80, &(0x7f0000000900), 0x0, &(0x7f00000009c0)=""/4096, 0x1000}, 0x0) 05:00:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000040), 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x14}, 0x14}, 0x1}, 0x0) 05:00:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@rand_addr, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in=@dev={0xac, 0x14, 0x14}}}, 0xe8) 05:00:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) 05:00:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) personality(0x0) 05:00:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) personality(0x0) 05:00:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240), &(0x7f00000005c0)}, 0x28) 05:00:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x14}, 0x14}, 0x1}, 0x0) 05:00:57 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6}]}) pipe2(&(0x7f0000000300), 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@nfc, 0x80, &(0x7f0000000900), 0x0, &(0x7f00000009c0)=""/4096, 0x1000}, 0x0) 05:00:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) ptrace$cont(0x0, 0x0, 0x0, 0x0) 05:00:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@rand_addr, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in=@dev={0xac, 0x14, 0x14}}}, 0xe8) 05:00:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) 05:00:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000040), 0x4) 05:00:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x14}, 0x14}, 0x1}, 0x0) 05:00:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240), &(0x7f00000005c0)}, 0x28) 05:00:58 executing program 4: pipe(&(0x7f00000000c0)) personality(0x0) 05:00:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240), &(0x7f00000005c0)}, 0x28) 05:00:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x14}, 0x14}, 0x1}, 0x0) 05:00:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@rand_addr, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in=@dev={0xac, 0x14, 0x14}}}, 0xe8) 05:00:58 executing program 4: pipe(&(0x7f00000000c0)) personality(0x0) 05:00:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) 05:00:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) creat(&(0x7f0000000180)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) 05:00:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000040), 0x4) 05:00:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240), &(0x7f00000005c0)}, 0x28) 05:00:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6}]}) pipe2(&(0x7f0000000300), 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@nfc, 0x80, &(0x7f0000000900), 0x0, &(0x7f00000009c0)=""/4096, 0x1000}, 0x0) 05:00:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000040), 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x14}, 0x14}, 0x1}, 0x0) 05:00:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@rand_addr, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in=@dev={0xac, 0x14, 0x14}}}, 0xe8) 05:00:58 executing program 4: pipe(&(0x7f00000000c0)) personality(0x0) 05:00:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) 05:00:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) creat(&(0x7f0000000180)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) 05:00:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000040), 0x4) 05:00:58 executing program 3: msgget$private(0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240), &(0x7f00000005c0)}, 0x28) [ 296.693723] kauditd_printk_skb: 4 callbacks suppressed [ 296.693746] audit: type=1326 audit(1529730058.692:538): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19434 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@rand_addr, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in=@dev={0xac, 0x14, 0x14}}}, 0xe8) [ 296.792192] audit: type=1326 audit(1529730058.742:539): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19440 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:58 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) pipe(&(0x7f00000000c0)) personality(0x0) 05:00:58 executing program 3: msgget$private(0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240), &(0x7f00000005c0)}, 0x28) 05:00:58 executing program 2: socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) 05:00:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000040), 0x4) 05:00:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) 05:00:59 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@rand_addr, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in=@dev={0xac, 0x14, 0x14}}}, 0xe8) 05:00:59 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) pipe(&(0x7f00000000c0)) personality(0x0) [ 297.138702] audit: type=1326 audit(1529730059.136:540): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19470 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6}]}) pipe2(&(0x7f0000000300), 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@nfc, 0x80, &(0x7f0000000900), 0x0, &(0x7f00000009c0)=""/4096, 0x1000}, 0x0) 05:00:59 executing program 3: msgget$private(0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240), &(0x7f00000005c0)}, 0x28) 05:00:59 executing program 2: socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) 05:00:59 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) pipe(&(0x7f00000000c0)) personality(0x0) 05:00:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000040), 0x4) 05:00:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) 05:00:59 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000040), 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x14}, 0x14}, 0x1}, 0x0) [ 297.692525] audit: type=1326 audit(1529730059.691:541): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19483 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:59 executing program 2: socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) 05:00:59 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240), &(0x7f00000005c0)}, 0x28) [ 297.755261] audit: type=1326 audit(1529730059.727:542): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19488 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:00:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) 05:00:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000040), 0x4) 05:00:59 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) pipe(&(0x7f00000000c0)) personality(0x0) 05:00:59 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) pipe(&(0x7f00000000c0)) personality(0x0) 05:01:00 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) 05:01:00 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@rand_addr, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in=@dev={0xac, 0x14, 0x14}}}, 0xe8) 05:01:00 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240), &(0x7f00000005c0)}, 0x28) [ 298.150098] audit: type=1326 audit(1529730060.148:543): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19523 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:00 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240), &(0x7f00000005c0)}, 0x28) 05:01:00 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) 05:01:00 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000040), 0x4) 05:01:00 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) pipe(&(0x7f00000000c0)) personality(0x0) 05:01:00 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) 05:01:00 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) getgroups(0x0, &(0x7f0000000300)) 05:01:00 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000040), 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x14}, 0x14}, 0x1}, 0x0) 05:01:00 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) pipe(&(0x7f00000000c0)) personality(0x0) 05:01:00 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) 05:01:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) msgget$private(0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240), &(0x7f00000005c0)}, 0x28) [ 298.746522] audit: type=1326 audit(1529730060.745:544): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19545 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:00 executing program 1: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000040), 0x4) 05:01:00 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) 05:01:00 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) getgroups(0x0, &(0x7f0000000300)) 05:01:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) 05:01:01 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@rand_addr, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, {{@in=@multicast2=0xe0000002}, 0x0, @in=@dev={0xac, 0x14, 0x14}}}, 0xe8) 05:01:01 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) pipe(&(0x7f00000000c0)) personality(0x0) 05:01:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) msgget$private(0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240), &(0x7f00000005c0)}, 0x28) 05:01:01 executing program 1: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000040), 0x4) 05:01:01 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) 05:01:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) 05:01:01 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) getgroups(0x0, &(0x7f0000000300)) 05:01:01 executing program 1: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000040), 0x4) [ 299.183139] audit: type=1326 audit(1529730061.181:545): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19582 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:01 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) pipe(&(0x7f00000000c0)) personality(0x0) 05:01:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) 05:01:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) msgget$private(0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240), &(0x7f00000005c0)}, 0x28) 05:01:01 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) 05:01:01 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000040), 0x4) 05:01:01 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 05:01:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000a80)=@nat={'nat\x00', 0x19, 0x5, 0x90, [0x20000280, 0x0, 0x0, 0x200002b0, 0x20000470], 0x0, &(0x7f00000001c0), &(0x7f0000000280)=[{}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x3}]}, 0x108) 05:01:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240), &(0x7f00000005c0)}, 0x28) 05:01:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) pipe(&(0x7f00000000c0)) personality(0x0) 05:01:02 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000040), 0x4) 05:01:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f4}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) 05:01:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000a80)=@nat={'nat\x00', 0x19, 0x5, 0x90, [0x20000280, 0x0, 0x0, 0x200002b0, 0x20000470], 0x0, &(0x7f00000001c0), &(0x7f0000000280)=[{}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x3}]}, 0x108) 05:01:02 executing program 0: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) 05:01:02 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 05:01:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240), &(0x7f00000005c0)}, 0x28) 05:01:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000001c0), 0x4) [ 300.121984] audit: type=1326 audit(1529730062.120:546): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19638 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:02 executing program 0: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) 05:01:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f4}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) 05:01:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240), &(0x7f00000005c0)}, 0x28) 05:01:02 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000040), 0x4) 05:01:02 executing program 0: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) 05:01:02 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 05:01:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000a80)=@nat={'nat\x00', 0x19, 0x5, 0x90, [0x20000280, 0x0, 0x0, 0x200002b0, 0x20000470], 0x0, &(0x7f00000001c0), &(0x7f0000000280)=[{}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x3}]}, 0x108) 05:01:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) msgget$private(0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240), &(0x7f00000005c0)}, 0x28) [ 300.485016] audit: type=1326 audit(1529730062.483:547): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19670 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) pipe(&(0x7f00000000c0)) personality(0x0) 05:01:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000001c0), 0x4) 05:01:03 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) 05:01:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000040), 0x4) 05:01:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f4}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) 05:01:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 05:01:03 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000a80)=@nat={'nat\x00', 0x19, 0x5, 0x90, [0x20000280, 0x0, 0x0, 0x200002b0, 0x20000470], 0x0, &(0x7f00000001c0), &(0x7f0000000280)=[{}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x3}]}, 0x108) 05:01:03 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) 05:01:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) 05:01:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000040), 0x4) 05:01:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000001c0), 0x4) 05:01:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 05:01:03 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000a80)=@nat={'nat\x00', 0x19, 0x5, 0x90, [0x20000280, 0x0, 0x0, 0x200002b0, 0x20000470], 0x0, &(0x7f00000001c0), &(0x7f0000000280)=[{}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x3}]}, 0x108) 05:01:03 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) 05:01:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000040), 0x4) 05:01:03 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) msgget$private(0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240), &(0x7f00000005c0)}, 0x28) 05:01:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) pipe(&(0x7f00000000c0)) personality(0x0) 05:01:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 05:01:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000001c0), 0x4) 05:01:04 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000a80)=@nat={'nat\x00', 0x19, 0x5, 0x90, [0x20000280, 0x0, 0x0, 0x200002b0, 0x20000470], 0x0, &(0x7f00000001c0), &(0x7f0000000280)=[{}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x3}]}, 0x108) 05:01:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) 05:01:04 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000040), 0x4) [ 302.110879] kauditd_printk_skb: 3 callbacks suppressed [ 302.110902] audit: type=1326 audit(1529730064.109:551): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19739 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:04 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000040), 0x4) 05:01:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 05:01:04 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) 05:01:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) 05:01:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000001c0), 0x4) 05:01:04 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000a80)=@nat={'nat\x00', 0x19, 0x5, 0x90, [0x20000280, 0x0, 0x0, 0x200002b0, 0x20000470], 0x0, &(0x7f00000001c0), &(0x7f0000000280)=[{}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x3}]}, 0x108) [ 302.387579] audit: type=1326 audit(1529730064.386:552): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19757 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) 05:01:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000001c0), 0x4) 05:01:04 executing program 7: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 05:01:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) msgget$private(0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240), &(0x7f00000005c0)}, 0x28) [ 302.635016] audit: type=1326 audit(1529730064.633:553): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19772 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:05 executing program 7: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 05:01:05 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000040), 0x4) 05:01:05 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000a80)=@nat={'nat\x00', 0x19, 0x5, 0x90, [0x20000280, 0x0, 0x0, 0x200002b0, 0x20000470], 0x0, &(0x7f00000001c0), &(0x7f0000000280)=[{}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x3}]}, 0x108) 05:01:05 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000001c0), 0x4) 05:01:05 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) 05:01:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x7530}, 0x10) 05:01:05 executing program 7: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 05:01:05 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000040), 0x4) [ 303.210332] audit: type=1326 audit(1529730065.209:554): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19798 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) 05:01:05 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000a80)=@nat={'nat\x00', 0x19, 0x5, 0x90, [0x20000280, 0x0, 0x0, 0x200002b0, 0x20000470], 0x0, &(0x7f00000001c0), &(0x7f0000000280)=[{}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x3}]}, 0x108) 05:01:05 executing program 6: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000001c0), 0x4) 05:01:05 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) 05:01:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x7530}, 0x10) 05:01:05 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) [ 303.334832] audit: type=1326 audit(1529730065.332:555): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19803 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:05 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) 05:01:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x7530}, 0x10) 05:01:05 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 05:01:05 executing program 6: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000001c0), 0x4) 05:01:05 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000a80)=@nat={'nat\x00', 0x19, 0x5, 0x90, [0x20000280, 0x0, 0x0, 0x200002b0, 0x20000470], 0x0, &(0x7f00000001c0), &(0x7f0000000280)=[{}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x3}]}, 0x108) 05:01:05 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) 05:01:05 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) [ 303.596039] audit: type=1326 audit(1529730065.594:556): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19825 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:05 executing program 6: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000001c0), 0x4) 05:01:05 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000a80)=@nat={'nat\x00', 0x19, 0x5, 0x90, [0x20000280, 0x0, 0x0, 0x200002b0, 0x20000470], 0x0, &(0x7f00000001c0), &(0x7f0000000280)=[{}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x3}]}, 0x108) 05:01:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000040), 0x4) [ 304.131879] audit: type=1326 audit(1529730066.130:557): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19852 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x7530}, 0x10) 05:01:06 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 05:01:06 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000a80)=@nat={'nat\x00', 0x19, 0x5, 0x90, [0x20000280, 0x0, 0x0, 0x200002b0, 0x20000470], 0x0, &(0x7f00000001c0), &(0x7f0000000280)=[{}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x3}]}, 0x108) 05:01:06 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000001c0), 0x4) 05:01:06 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) 05:01:06 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 05:01:06 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000001c0), 0x4) 05:01:06 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000a80)=@nat={'nat\x00', 0x19, 0x5, 0x90, [0x20000280, 0x0, 0x0, 0x200002b0, 0x20000470], 0x0, &(0x7f00000001c0), &(0x7f0000000280)=[{}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x3}]}, 0x108) 05:01:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x7530}, 0x10) 05:01:06 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) 05:01:06 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 05:01:06 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) 05:01:06 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000001c0), 0x4) 05:01:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000a80)=@nat={'nat\x00', 0x19, 0x5, 0x90, [0x20000280, 0x0, 0x0, 0x200002b0, 0x20000470], 0x0, &(0x7f00000001c0), &(0x7f0000000280)=[{}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x3}]}, 0x108) 05:01:06 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) [ 304.592146] audit: type=1326 audit(1529730066.590:558): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19885 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000040), 0x4) 05:01:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x7530}, 0x10) 05:01:07 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 05:01:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000001c0), 0x4) 05:01:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000a80)=@nat={'nat\x00', 0x19, 0x5, 0x90, [0x20000280, 0x0, 0x0, 0x200002b0, 0x20000470], 0x0, &(0x7f00000001c0), &(0x7f0000000280)=[{}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x3}]}, 0x108) 05:01:07 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) 05:01:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000001c0), 0x4) [ 305.101242] audit: type=1326 audit(1529730067.099:559): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19914 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000a80)=@nat={'nat\x00', 0x19, 0x5, 0x90, [0x20000280, 0x0, 0x0, 0x200002b0, 0x20000470], 0x0, &(0x7f00000001c0), &(0x7f0000000280)=[{}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x3}]}, 0x108) 05:01:07 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 05:01:07 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) 05:01:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x7530}, 0x10) 05:01:07 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 05:01:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) 05:01:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000001c0), 0x4) 05:01:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000a80)=@nat={'nat\x00', 0x19, 0x5, 0x90, [0x20000280, 0x0, 0x0, 0x200002b0, 0x20000470], 0x0, &(0x7f00000001c0), &(0x7f0000000280)=[{}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x3}]}, 0x108) 05:01:07 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) [ 305.523864] audit: type=1326 audit(1529730067.522:560): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19946 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:08 executing program 3: socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) 05:01:08 executing program 4: socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x7530}, 0x10) 05:01:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 05:01:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000001c0), 0x4) 05:01:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000a80)=@nat={'nat\x00', 0x19, 0x5, 0x90, [0x20000280, 0x0, 0x0, 0x200002b0, 0x20000470], 0x0, &(0x7f00000001c0), &(0x7f0000000280)=[{}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x3}]}, 0x108) 05:01:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 05:01:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000a80)=@nat={'nat\x00', 0x19, 0x5, 0x90, [0x20000280, 0x0, 0x0, 0x200002b0, 0x20000470], 0x0, &(0x7f00000001c0), &(0x7f0000000280)=[{}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x3}]}, 0x108) 05:01:08 executing program 3: socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) 05:01:08 executing program 4: socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x7530}, 0x10) 05:01:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000001c0), 0x4) 05:01:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000040)) 05:01:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000), 0x4) 05:01:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000), 0x4) 05:01:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000001c0), 0x4) 05:01:08 executing program 4: socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x7530}, 0x10) 05:01:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000040)) 05:01:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000a80)=@nat={'nat\x00', 0x19, 0x5, 0x90, [0x20000280, 0x0, 0x0, 0x200002b0, 0x20000470], 0x0, &(0x7f00000001c0), &(0x7f0000000280)=[{}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x3}]}, 0x108) 05:01:08 executing program 3: socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) 05:01:08 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) 05:01:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000001c0), 0x4) 05:01:08 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x7530}, 0x10) 05:01:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 05:01:09 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) 05:01:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000040)) 05:01:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000), 0x4) 05:01:09 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x7530}, 0x10) 05:01:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) [ 307.146156] kauditd_printk_skb: 3 callbacks suppressed [ 307.146179] audit: type=1326 audit(1529730069.144:564): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20028 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:09 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x7530}, 0x10) 05:01:09 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) 05:01:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000), 0x4) 05:01:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) 05:01:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000040)) 05:01:09 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000a80)=@nat={'nat\x00', 0x19, 0x5, 0x90, [0x20000280, 0x0, 0x0, 0x200002b0, 0x20000470], 0x0, &(0x7f00000001c0), &(0x7f0000000280)=[{}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x3}]}, 0x108) 05:01:09 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) 05:01:09 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x7530}, 0x10) [ 307.494600] audit: type=1326 audit(1529730069.493:565): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20053 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000001c0), 0x4) 05:01:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000), 0x4) [ 307.661361] audit: type=1326 audit(1529730069.660:566): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20064 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:10 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 05:01:10 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) 05:01:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000040)) 05:01:10 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) 05:01:10 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x7530}, 0x10) 05:01:10 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000), 0x4) [ 308.104920] audit: type=1326 audit(1529730070.103:567): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20077 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:10 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x7530}, 0x10) 05:01:10 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000), 0x4) 05:01:10 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) 05:01:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000040)) 05:01:10 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) 05:01:10 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000a80)=@nat={'nat\x00', 0x19, 0x5, 0x90, [0x20000280, 0x0, 0x0, 0x200002b0, 0x20000470], 0x0, &(0x7f00000001c0), &(0x7f0000000280)=[{}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x3}]}, 0x108) 05:01:10 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x7530}, 0x10) 05:01:10 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) [ 308.511792] audit: type=1326 audit(1529730070.510:568): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20109 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:10 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000001c0), 0x4) 05:01:10 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) [ 308.632216] audit: type=1326 audit(1529730070.628:569): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20117 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000040)) 05:01:11 executing program 1: pipe2(&(0x7f0000000040), 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000), 0x4) 05:01:11 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x8000502a9}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) 05:01:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x7530}, 0x10) 05:01:11 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) 05:01:11 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000005bc0), 0x0) 05:01:11 executing program 1: pipe2(&(0x7f0000000040), 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000), 0x4) 05:01:11 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x8000502a9}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) 05:01:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x7530}, 0x10) 05:01:11 executing program 2: msgget$private(0x0, 0x0) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000040)) 05:01:11 executing program 0: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) 05:01:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x7530}, 0x10) 05:01:11 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000005bc0), 0x0) 05:01:11 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x8000502a9}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) [ 309.460485] audit: type=1326 audit(1529730071.459:570): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20160 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:11 executing program 2: msgget$private(0x0, 0x0) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000040)) 05:01:11 executing program 1: pipe2(&(0x7f0000000040), 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000), 0x4) 05:01:11 executing program 0: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) 05:01:11 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) getgid() 05:01:11 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) 05:01:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000ac0)=@kern={0x10}, 0xc, &(0x7f0000000100), 0x0, &(0x7f0000000740)}, 0x0) 05:01:11 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000005bc0), 0x0) [ 309.609999] audit: type=1326 audit(1529730071.608:571): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20176 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:11 executing program 0: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) 05:01:11 executing program 2: msgget$private(0x0, 0x0) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000040)) 05:01:11 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000), 0x4) 05:01:11 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) getgid() 05:01:11 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000040)) 05:01:11 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000005bc0), 0x0) 05:01:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x7530}, 0x10) 05:01:12 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) 05:01:12 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000), 0x4) 05:01:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000ac0)=@kern={0x10}, 0xc, &(0x7f0000000100), 0x0, &(0x7f0000000740)}, 0x0) 05:01:12 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000040)) 05:01:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) getgid() 05:01:12 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000005bc0), 0x0) [ 310.385417] audit: type=1326 audit(1529730072.384:572): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20209 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:12 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) 05:01:12 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000040)) 05:01:12 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) 05:01:12 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000), 0x4) 05:01:12 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000005bc0), 0x0) 05:01:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000ac0)=@kern={0x10}, 0xc, &(0x7f0000000100), 0x0, &(0x7f0000000740)}, 0x0) 05:01:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) getgid() 05:01:12 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) [ 310.684491] audit: type=1326 audit(1529730072.683:573): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20238 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) msgget$private(0x0, 0x0) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000040)) 05:01:13 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x7530}, 0x10) 05:01:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000040), 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000), 0x4) 05:01:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000005bc0), 0x0) 05:01:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000ac0)=@kern={0x10}, 0xc, &(0x7f0000000100), 0x0, &(0x7f0000000740)}, 0x0) 05:01:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) 05:01:13 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) getgid() 05:01:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) msgget$private(0x0, 0x0) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000040)) 05:01:13 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) 05:01:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) msgget$private(0x0, 0x0) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000040)) 05:01:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000040), 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000), 0x4) 05:01:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000ac0)=@kern={0x10}, 0xc, &(0x7f0000000100), 0x0, &(0x7f0000000740)}, 0x0) 05:01:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) 05:01:13 executing program 7: syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000005bc0), 0x0) 05:01:13 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) getgid() 05:01:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000040), 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000), 0x4) 05:01:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000040)) 05:01:14 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000ac0)=@kern={0x10}, 0xc, &(0x7f0000000100), 0x0, &(0x7f0000000740)}, 0x0) 05:01:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) 05:01:14 executing program 7: syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000005bc0), 0x0) 05:01:14 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) getgid() 05:01:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000), 0x4) 05:01:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000040)) 05:01:14 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) 05:01:14 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) 05:01:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000), 0x4) 05:01:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50030}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) 05:01:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000040)) 05:01:14 executing program 7: syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000005bc0), 0x0) 05:01:14 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) getgid() 05:01:14 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000ac0)=@kern={0x10}, 0xc, &(0x7f0000000100), 0x0, &(0x7f0000000740)}, 0x0) 05:01:14 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) pivot_root(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='./file0\x00') 05:01:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50030}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) 05:01:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000), 0x4) 05:01:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) msgget$private(0x0, 0x0) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000040)) 05:01:14 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) getgid() 05:01:14 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000005bc0), 0x0) 05:01:14 executing program 6: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000ac0)=@kern={0x10}, 0xc, &(0x7f0000000100), 0x0, &(0x7f0000000740)}, 0x0) 05:01:14 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) [ 312.796615] kauditd_printk_skb: 2 callbacks suppressed [ 312.796641] audit: type=1326 audit(1529730074.795:576): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20362 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:14 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) pivot_root(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='./file0\x00') 05:01:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000040), 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000), 0x4) 05:01:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50030}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) 05:01:14 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) getgid() 05:01:15 executing program 6: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000ac0)=@kern={0x10}, 0xc, &(0x7f0000000100), 0x0, &(0x7f0000000740)}, 0x0) 05:01:15 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000005bc0), 0x0) [ 312.982039] audit: type=1326 audit(1529730074.980:577): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20377 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:15 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) 05:01:15 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) pivot_root(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='./file0\x00') 05:01:15 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) getgid() 05:01:15 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) 05:01:15 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000005bc0), 0x0) [ 313.277733] audit: type=1326 audit(1529730075.276:578): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20406 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) msgget$private(0x0, 0x0) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000040)) 05:01:15 executing program 6: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000ac0)=@kern={0x10}, 0xc, &(0x7f0000000100), 0x0, &(0x7f0000000740)}, 0x0) 05:01:15 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket$inet(0x2, 0x0, 0x0) 05:01:15 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000005bc0), 0x0) 05:01:15 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) getgid() 05:01:15 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) pivot_root(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='./file0\x00') [ 313.708497] audit: type=1326 audit(1529730075.707:579): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20413 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000040), 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000), 0x4) 05:01:15 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) getgid() 05:01:15 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000005bc0), 0x0) 05:01:15 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket$inet(0x2, 0x0, 0x0) 05:01:15 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000ac0)=@kern={0x10}, 0xc, &(0x7f0000000100), 0x0, &(0x7f0000000740)}, 0x0) 05:01:15 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) pivot_root(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='./file0\x00') [ 313.969671] audit: type=1326 audit(1529730075.968:580): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20441 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:16 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000005bc0), 0x0) 05:01:16 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000ac0)=@kern={0x10}, 0xc, &(0x7f0000000100), 0x0, &(0x7f0000000740)}, 0x0) 05:01:16 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) 05:01:16 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) getgid() [ 314.238258] audit: type=1326 audit(1529730076.235:581): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20460 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) msgget$private(0x0, 0x0) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000040)) 05:01:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) pivot_root(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='./file0\x00') 05:01:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket$inet(0x2, 0x0, 0x0) 05:01:16 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000ac0)=@kern={0x10}, 0xc, &(0x7f0000000100), 0x0, &(0x7f0000000740)}, 0x0) 05:01:16 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505a7}]}) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000005bc0), 0x0) 05:01:16 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) getgid() [ 314.660691] audit: type=1326 audit(1529730076.659:582): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20464 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000040), 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000), 0x4) 05:01:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000ac0)=@kern={0x10}, 0xc, &(0x7f0000000100), 0x0, &(0x7f0000000740)}, 0x0) 05:01:16 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505a7}]}) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000005bc0), 0x0) 05:01:16 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) getgid() 05:01:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) pivot_root(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='./file0\x00') 05:01:16 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) 05:01:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000ac0)=@kern={0x10}, 0xc, &(0x7f0000000100), 0x0, &(0x7f0000000740)}, 0x0) [ 314.913430] audit: type=1326 audit(1529730076.912:583): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20484 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:17 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50030}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) getgid() 05:01:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) 05:01:17 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505a7}]}) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000005bc0), 0x0) [ 315.206506] audit: type=1326 audit(1529730077.204:584): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20513 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000ac0)=@kern={0x10}, 0xc, &(0x7f0000000100), 0x0, &(0x7f0000000740)}, 0x0) 05:01:17 executing program 3: creat(&(0x7f00000000c0)='./file0\x00', 0x0) pivot_root(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='./file0\x00') 05:01:17 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) 05:01:17 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50030}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) getgid() 05:01:17 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000005bc0), 0x0) 05:01:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6, 0x0, 0x0, 0x50344}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 315.573979] audit: type=1326 audit(1529730077.572:585): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20517 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6, 0x0, 0x0, 0x50344}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 05:01:17 executing program 3: creat(&(0x7f00000000c0)='./file0\x00', 0x0) pivot_root(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='./file0\x00') 05:01:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000ac0)=@kern={0x10}, 0xc, &(0x7f0000000100), 0x0, &(0x7f0000000740)}, 0x0) 05:01:17 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50030}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) getgid() 05:01:17 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) 05:01:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000100)={'nat\x00'}, &(0x7f0000000180)=0x78) 05:01:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6, 0x0, 0x0, 0x50344}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 05:01:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000ac0)=@kern={0x10}, 0xc, &(0x7f0000000100), 0x0, &(0x7f0000000740)}, 0x0) 05:01:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6, 0x0, 0x0, 0x50344}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 05:01:18 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) 05:01:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000100)={'nat\x00'}, &(0x7f0000000180)=0x78) 05:01:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) getgid() 05:01:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000ac0)=@kern={0x10}, 0xc, &(0x7f0000000100), 0x0, &(0x7f0000000740)}, 0x0) 05:01:18 executing program 3: creat(&(0x7f00000000c0)='./file0\x00', 0x0) pivot_root(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='./file0\x00') 05:01:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000005bc0), 0x0) 05:01:18 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x6}, 0xffffffffffffff4e) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000600), &(0x7f0000000200)}, 0x20) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f0, &(0x7f0000000300)='0\x00') 05:01:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000ac0)=@kern={0x10}, 0xc, &(0x7f0000000100), 0x0, &(0x7f0000000740)}, 0x0) 05:01:18 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) pivot_root(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='./file0\x00') 05:01:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6, 0x0, 0x0, 0x50344}]}) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 05:01:18 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) 05:01:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000100)={'nat\x00'}, &(0x7f0000000180)=0x78) 05:01:18 executing program 0: syz_emit_ethernet(0x1a, &(0x7f0000000040)={@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [{[{0x9100, 0x0, 0x101}], {0x8100, 0x1, 0x200}}], {@mpls_uc={0x8847, {[{0x0, 0x0, 0x7, 0x7}]}}}}, &(0x7f00000000c0)={0x0, 0x4, [0x0, 0x96d]}) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_emit_ethernet(0x3e, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000000)) 05:01:18 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) pivot_root(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='./file0\x00') 05:01:18 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) 05:01:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6, 0x0, 0x0, 0x50344}]}) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 05:01:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000100)={'nat\x00'}, &(0x7f0000000180)=0x78) 05:01:18 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) pivot_root(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='./file0\x00') 05:01:19 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) getgid() 05:01:19 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000300), 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000080)=@known='security.capability\x00') 05:01:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6, 0x0, 0x0, 0x50344}]}) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 05:01:19 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000005bc0), 0x0) 05:01:19 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) 05:01:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000100)={'nat\x00'}, &(0x7f0000000180)=0x78) 05:01:19 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) pivot_root(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='./file0\x00') 05:01:19 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000ac0)=@kern={0x10}, 0xc, &(0x7f0000000100), 0x0, &(0x7f0000000740)}, 0x0) 05:01:19 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000300), 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000080)=@known='security.capability\x00') 05:01:19 executing program 2: dup2(0xffffffffffffff9c, 0xffffffffffffffff) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 05:01:19 executing program 2: dup2(0xffffffffffffff9c, 0xffffffffffffffff) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 05:01:19 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) pivot_root(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='./file0\x00') 05:01:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000100)={'nat\x00'}, &(0x7f0000000180)=0x78) 05:01:19 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000300), 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000080)=@known='security.capability\x00') 05:01:19 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) 05:01:19 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) pivot_root(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='./file0\x00') 05:01:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000100)={'nat\x00'}, &(0x7f0000000180)=0x78) 05:01:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) 05:01:20 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) getgid() [ 318.054190] kauditd_printk_skb: 6 callbacks suppressed [ 318.054212] audit: type=1326 audit(1529730080.052:592): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20689 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:20 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000ac0)=@kern={0x10}, 0xc, &(0x7f0000000100), 0x0, &(0x7f0000000740)}, 0x0) 05:01:20 executing program 2: dup2(0xffffffffffffff9c, 0xffffffffffffffff) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 05:01:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) pivot_root(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='./file0\x00') 05:01:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000300), 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000080)=@known='security.capability\x00') 05:01:20 executing program 1: creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000100)={'nat\x00'}, &(0x7f0000000180)=0x78) 05:01:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) 05:01:20 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) [ 318.461996] audit: type=1326 audit(1529730080.460:593): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20704 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:20 executing program 1: creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000100)={'nat\x00'}, &(0x7f0000000180)=0x78) 05:01:20 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6, 0x0, 0x0, 0x50344}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 05:01:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) pivot_root(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='./file0\x00') 05:01:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) fremovexattr(0xffffffffffffffff, &(0x7f0000000080)=@known='security.capability\x00') 05:01:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) 05:01:20 executing program 1: creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000100)={'nat\x00'}, &(0x7f0000000180)=0x78) 05:01:20 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6, 0x0, 0x0, 0x50344}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 05:01:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) fremovexattr(0xffffffffffffffff, &(0x7f0000000080)=@known='security.capability\x00') 05:01:20 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6, 0x0, 0x0, 0x50344}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 05:01:21 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) 05:01:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) pivot_root(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='./file0\x00') 05:01:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) 05:01:21 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000100)={'nat\x00'}, &(0x7f0000000180)=0x78) 05:01:21 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) fremovexattr(0xffffffffffffffff, &(0x7f0000000080)=@known='security.capability\x00') 05:01:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000180)=""/139) 05:01:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000600)}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 05:01:21 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket$inet_udp(0x2, 0x2, 0x0) read(0xffffffffffffffff, &(0x7f0000000400)=""/154, 0x9a) 05:01:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) pivot_root(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='./file0\x00') 05:01:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000600)}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 05:01:21 executing program 0: pipe2(&(0x7f0000000300), 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000080)=@known='security.capability\x00') 05:01:21 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000100)={'nat\x00'}, &(0x7f0000000180)=0x78) 05:01:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) 05:01:21 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) [ 319.611807] audit: type=1326 audit(1529730081.610:594): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20781 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:21 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x3}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e, 0xf0fffffffffffe}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) 05:01:21 executing program 6: 05:01:21 executing program 0: pipe2(&(0x7f0000000300), 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000080)=@known='security.capability\x00') 05:01:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000600)}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 319.749198] audit: type=1326 audit(1529730081.746:595): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20792 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 319.761371] bridge_slave_0: FDB only supports static addresses 05:01:21 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000100)={'nat\x00'}, &(0x7f0000000180)=0x78) 05:01:21 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) 05:01:21 executing program 6: 05:01:21 executing program 5: 05:01:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x0, 0x0, 0x0, 0x50344}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 05:01:22 executing program 0: pipe2(&(0x7f0000000300), 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000080)=@known='security.capability\x00') 05:01:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) pivot_root(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='./file0\x00') 05:01:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000100)={'nat\x00'}, &(0x7f0000000180)=0x78) 05:01:22 executing program 5: 05:01:22 executing program 6: [ 320.541281] audit: type=1326 audit(1529730082.539:596): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20834 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) 05:01:22 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000300), 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000080)=@known='security.capability\x00') 05:01:22 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) 05:01:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x0, 0x0, 0x0, 0x50344}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 05:01:22 executing program 6: 05:01:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000100)={'nat\x00'}, &(0x7f0000000180)=0x78) 05:01:22 executing program 5: 05:01:22 executing program 6: [ 320.730783] audit: type=1326 audit(1529730082.729:597): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20855 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) 05:01:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x0, 0x0, 0x0, 0x50344}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 05:01:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000100)={'nat\x00'}, &(0x7f0000000180)=0x78) 05:01:22 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000300), 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000080)=@known='security.capability\x00') 05:01:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) pivot_root(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='./file0\x00') 05:01:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) 05:01:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) 05:01:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 321.477014] audit: type=1326 audit(1529730083.475:598): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20881 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 321.519443] audit: type=1326 audit(1529730083.508:599): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20885 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:23 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) 05:01:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000100)={'nat\x00'}, &(0x7f0000000180)=0x78) 05:01:23 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000300), 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000080)=@known='security.capability\x00') 05:01:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) 05:01:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) 05:01:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) [ 321.715432] audit: type=1326 audit(1529730083.714:600): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20904 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:23 executing program 7: socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) 05:01:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000100)={'nat\x00'}, &(0x7f0000000180)=0x78) 05:01:23 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}) pipe2(&(0x7f0000000300), 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000080)=@known='security.capability\x00') 05:01:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) 05:01:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) 05:01:23 executing program 7: socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) 05:01:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 05:01:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}) pipe2(&(0x7f0000000300), 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000080)=@known='security.capability\x00') 05:01:24 executing program 7: socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) 05:01:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000100)={'nat\x00'}, &(0x7f0000000180)=0x78) [ 322.459847] audit: type=1326 audit(1529730084.458:601): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20936 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000100)={'nat\x00'}, &(0x7f0000000180)=0x78) 05:01:24 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) 05:01:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) 05:01:24 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) dup(0xffffffffffffffff) time(&(0x7f0000000000)) 05:01:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}) pipe2(&(0x7f0000000300), 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000080)=@known='security.capability\x00') 05:01:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000080)) 05:01:24 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) 05:01:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000300), 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000080)=@known='security.capability\x00') 05:01:24 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) 05:01:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000080)) 05:01:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) 05:01:24 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) keyctl$negate(0xd, 0x0, 0x0, 0x0) 05:01:25 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) 05:01:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 05:01:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) dup(0xffffffffffffffff) time(&(0x7f0000000000)) 05:01:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) [ 323.403942] kauditd_printk_skb: 1 callbacks suppressed [ 323.403963] audit: type=1326 audit(1529730085.402:603): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20991 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000100)={'nat\x00'}, &(0x7f0000000180)=0x78) 05:01:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000300), 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000080)=@known='security.capability\x00') 05:01:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000080)) 05:01:25 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) keyctl$negate(0xd, 0x0, 0x0, 0x0) 05:01:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) 05:01:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) 05:01:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) dup(0xffffffffffffffff) time(&(0x7f0000000000)) 05:01:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000300), 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000080)=@known='security.capability\x00') [ 323.669199] audit: type=1326 audit(1529730085.667:604): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21012 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) 05:01:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000080)) 05:01:25 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) keyctl$negate(0xd, 0x0, 0x0, 0x0) 05:01:25 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) 05:01:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) dup(0xffffffffffffffff) time(&(0x7f0000000000)) 05:01:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) time(&(0x7f0000000000)) 05:01:26 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6}]}) pipe2(&(0x7f0000000300), 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000080)=@known='security.capability\x00') 05:01:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) [ 324.334679] audit: type=1326 audit(1529730086.333:605): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21040 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000100)={'nat\x00'}, &(0x7f0000000180)=0x78) 05:01:26 executing program 6: msgget$private(0x0, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) 05:01:26 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) 05:01:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000080)) 05:01:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000080)={0x0, 'teql0\x00'}, 0x18) 05:01:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f4}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) 05:01:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) time(&(0x7f0000000000)) 05:01:26 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) [ 324.648252] audit: type=1326 audit(1529730086.646:606): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21062 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) time(&(0x7f0000000000)) 05:01:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000080)) 05:01:26 executing program 6: msgget$private(0x0, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) 05:01:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f4}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) 05:01:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000080)={0x0, 'teql0\x00'}, 0x18) 05:01:26 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) 05:01:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6}]}) pipe2(&(0x7f0000000300), 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000080)=@known='security.capability\x00') 05:01:27 executing program 6: msgget$private(0x0, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) [ 325.270543] audit: type=1326 audit(1529730087.268:607): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21094 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:27 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) 05:01:27 executing program 4: dup(0xffffffffffffffff) time(&(0x7f0000000000)) 05:01:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f4}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) 05:01:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000080)={0x0, 'teql0\x00'}, 0x18) 05:01:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000080)) 05:01:27 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) 05:01:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0x9) 05:01:27 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) 05:01:27 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) 05:01:27 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000080)) 05:01:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) 05:01:27 executing program 4: dup(0xffffffffffffffff) time(&(0x7f0000000000)) 05:01:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000080)={0x0, 'teql0\x00'}, 0x18) 05:01:27 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) [ 325.834599] audit: type=1326 audit(1529730087.833:608): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21130 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6}]}) pipe2(&(0x7f0000000300), 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000080)=@known='security.capability\x00') 05:01:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0x9) 05:01:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) 05:01:28 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000080)) 05:01:28 executing program 4: dup(0xffffffffffffffff) time(&(0x7f0000000000)) 05:01:28 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) msgget$private(0x0, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) 05:01:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000080)={0x0, 'teql0\x00'}, 0x18) 05:01:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) 05:01:28 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) msgget$private(0x0, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) [ 326.247620] audit: type=1326 audit(1529730088.246:609): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21156 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:28 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000080)) 05:01:28 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) dup(0xffffffffffffffff) time(&(0x7f0000000000)) 05:01:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000080)={0x0, 'teql0\x00'}, 0x18) 05:01:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0x9) 05:01:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000080)={0x0, 'teql0\x00'}, 0x18) 05:01:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) 05:01:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) [ 326.771858] audit: type=1326 audit(1529730088.770:610): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21188 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:29 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000080)) 05:01:29 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) dup(0xffffffffffffffff) time(&(0x7f0000000000)) 05:01:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) msgget$private(0x0, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) 05:01:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) 05:01:29 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000080)={0x0, 'teql0\x00'}, 0x18) 05:01:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50193}]}) socket$packet(0x11, 0x0, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f0000009080), 0x0, 0x0, &(0x7f0000009140)) 05:01:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0x9) 05:01:29 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000080)={0x0, 'teql0\x00'}, 0x18) 05:01:29 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000080)) 05:01:29 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) dup(0xffffffffffffffff) time(&(0x7f0000000000)) 05:01:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) 05:01:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) 05:01:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0x9) 05:01:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) 05:01:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50193}]}) socket$packet(0x11, 0x0, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f0000009080), 0x0, 0x0, &(0x7f0000009140)) 05:01:29 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000080)={0x0, 'teql0\x00'}, 0x18) 05:01:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) 05:01:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) 05:01:29 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) dup(0xffffffffffffffff) time(&(0x7f0000000000)) 05:01:29 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000080)) 05:01:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0x9) [ 327.758870] audit: type=1326 audit(1529730089.757:611): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21250 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) 05:01:29 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) dup(0xffffffffffffffff) time(&(0x7f0000000000)) 05:01:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) 05:01:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000080)) 05:01:29 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000080)={0x0, 'teql0\x00'}, 0x18) 05:01:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50193}]}) socket$packet(0x11, 0x0, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f0000009080), 0x0, 0x0, &(0x7f0000009140)) 05:01:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0x9) [ 327.905256] audit: type=1326 audit(1529730089.903:612): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21259 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000080)) 05:01:30 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000080)={0x0, 'teql0\x00'}, 0x18) 05:01:30 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) msgget$private(0x0, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) 05:01:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) dup(0xffffffffffffffff) time(&(0x7f0000000000)) 05:01:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000080)) 05:01:30 executing program 1: open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0x9) 05:01:30 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50193}]}) socket$packet(0x11, 0x0, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f0000009080), 0x0, 0x0, &(0x7f0000009140)) 05:01:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f00000002c0)) [ 328.705645] audit: type=1326 audit(1529730090.704:613): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21289 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:30 executing program 1: open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0x9) 05:01:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) 05:01:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000080)) 05:01:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]}) dup(0xffffffffffffffff) time(&(0x7f0000000000)) 05:01:30 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000080)={0x0, 'teql0\x00'}, 0x18) 05:01:30 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50193}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000009080), 0x0, 0x0, &(0x7f0000009140)) 05:01:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f00000002c0)) 05:01:30 executing program 1: open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0x9) [ 328.973884] audit: type=1326 audit(1529730090.972:614): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21313 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000080)) 05:01:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]}) dup(0xffffffffffffffff) time(&(0x7f0000000000)) 05:01:31 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) msgget$private(0x0, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) 05:01:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000080)={0x0, 'teql0\x00'}, 0x18) 05:01:31 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50193}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000009080), 0x0, 0x0, &(0x7f0000009140)) 05:01:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f00000002c0)) 05:01:31 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0x9) 05:01:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000080)) 05:01:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]}) dup(0xffffffffffffffff) time(&(0x7f0000000000)) [ 329.620001] audit: type=1326 audit(1529730091.618:615): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21337 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) 05:01:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000080)) 05:01:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) dup(0xffffffffffffffff) time(&(0x7f0000000000)) 05:01:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000080)={0x0, 'teql0\x00'}, 0x18) 05:01:31 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0x9) 05:01:31 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50193}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000009080), 0x0, 0x0, &(0x7f0000009140)) 05:01:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f00000002c0)) [ 329.910587] audit: type=1326 audit(1529730091.909:617): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21360 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:31 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0x9) [ 329.952981] audit: type=1326 audit(1529730091.930:618): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21361 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 329.972818] audit: type=1326 audit(1529730091.908:616): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21362 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000080)={0x0, 'teql0\x00'}, 0x18) 05:01:32 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) msgget$private(0x0, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) 05:01:32 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f00000002c0)) 05:01:32 executing program 0: socket$packet(0x11, 0x0, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f0000009080), 0x0, 0x0, &(0x7f0000009140)) 05:01:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0x9) 05:01:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x8000502b5}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000080)={0x0, 'teql0\x00'}, 0x18) [ 330.549368] audit: type=1326 audit(1529730092.548:619): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21385 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x8000502b5}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000080)={0x0, 'teql0\x00'}, 0x18) 05:01:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0x9) 05:01:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000540)}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0x9) 05:01:32 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000080)) 05:01:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x8000502b5}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000080)={0x0, 'teql0\x00'}, 0x18) 05:01:32 executing program 0: socket$packet(0x11, 0x0, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f0000009080), 0x0, 0x0, &(0x7f0000009140)) 05:01:32 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f00000002c0)) 05:01:32 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x5002b}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 05:01:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) dup(0xffffffffffffffff) time(&(0x7f0000000000)) 05:01:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0x9) [ 330.940191] audit: type=1326 audit(1529730092.938:620): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21418 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:33 executing program 0: socket$packet(0x11, 0x0, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f0000009080), 0x0, 0x0, &(0x7f0000009140)) [ 331.021445] audit: type=1326 audit(1529730092.969:621): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21423 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:33 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50193}]}) socket$packet(0x11, 0x0, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f0000009080), 0x0, 0x0, &(0x7f0000009140)) 05:01:33 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x5002b}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 05:01:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000080)={0x0, 'teql0\x00'}, 0x18) 05:01:33 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f00000002c0)) 05:01:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0x9) 05:01:33 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) accept4$packet(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x14, 0x0) [ 331.498216] audit: type=1326 audit(1529730093.496:622): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21439 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:33 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50193}]}) socket$packet(0x11, 0x0, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f0000009080), 0x0, 0x0, &(0x7f0000009140)) 05:01:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50031}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0x9) 05:01:33 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000080)) 05:01:33 executing program 7: getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f00000002c0)) 05:01:33 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) accept4$packet(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x14, 0x0) 05:01:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0x9) 05:01:33 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x5002b}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 05:01:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) dup(0xffffffffffffffff) time(&(0x7f0000000000)) 05:01:33 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50193}]}) socket$packet(0x11, 0x0, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f0000009080), 0x0, 0x0, &(0x7f0000009140)) 05:01:33 executing program 7: getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f00000002c0)) 05:01:34 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x5002b}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 05:01:34 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) accept4$packet(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x14, 0x0) 05:01:34 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000080)={0x0, 'teql0\x00'}, 0x18) 05:01:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) socket$packet(0x11, 0x0, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f0000009080), 0x0, 0x0, &(0x7f0000009140)) 05:01:34 executing program 7: getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f00000002c0)) 05:01:34 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x5002b}]}) socket$nl_netfilter(0x10, 0x3, 0xc) 05:01:34 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) accept4$packet(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x14, 0x0) 05:01:34 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f00000002c0)) 05:01:34 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x5002b}]}) socket$nl_netfilter(0x10, 0x3, 0xc) 05:01:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) socket$packet(0x11, 0x0, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f0000009080), 0x0, 0x0, &(0x7f0000009140)) 05:01:34 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) accept4$packet(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x14, 0x0) 05:01:34 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f00000002c0)) 05:01:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0x9) 05:01:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000580), 0x4) 05:01:34 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000080)=""/25, 0x19, 0x0, &(0x7f00000000c0)) 05:01:34 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f00000002c0)) 05:01:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) socket$packet(0x11, 0x0, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f0000009080), 0x0, 0x0, &(0x7f0000009140)) 05:01:34 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x5002b}]}) socket$nl_netfilter(0x10, 0x3, 0xc) 05:01:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000080)={0x0, 'teql0\x00'}, 0x18) 05:01:35 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) accept4$packet(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x14, 0x0) 05:01:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000580), 0x4) 05:01:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f00000002c0)) 05:01:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50193}]}) socket$packet(0x11, 0x0, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f0000009080), 0x0, 0x0, &(0x7f0000009140)) 05:01:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000080)=""/25, 0x19, 0x0, &(0x7f00000000c0)) 05:01:35 executing program 5: openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 05:01:35 executing program 5: openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 05:01:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f00000002c0)) 05:01:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50193}]}) socket$packet(0x11, 0x0, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f0000009080), 0x0, 0x0, &(0x7f0000009140)) 05:01:35 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) accept4$packet(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x14, 0x0) 05:01:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50193}]}) socket$packet(0x11, 0x0, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f0000009080), 0x0, 0x0, &(0x7f0000009140)) 05:01:35 executing program 5: openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 05:01:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000080)=""/25, 0x19, 0x0, &(0x7f00000000c0)) 05:01:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000580), 0x4) 05:01:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0x9) [ 333.802834] kauditd_printk_skb: 6 callbacks suppressed [ 333.802857] audit: type=1326 audit(1529730095.801:629): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21592 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000080)=""/25, 0x19, 0x0, &(0x7f00000000c0)) 05:01:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f00000002c0)) 05:01:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000580), 0x4) 05:01:36 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000040)) accept4$packet(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x14, 0x0) 05:01:36 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x5002b}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 05:01:36 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$packet(0x11, 0x0, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f0000009080), 0x0, 0x0, &(0x7f0000009140)) 05:01:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000000)={0x10}, 0xc) [ 334.383909] audit: type=1326 audit(1529730096.382:630): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21603 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:36 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x5002b}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 05:01:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f00000002c0)) 05:01:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000580), 0x4) 05:01:36 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000040)) accept4$packet(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x14, 0x0) 05:01:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000580), 0x4) 05:01:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000080)=""/25, 0x19, 0x0, &(0x7f00000000c0)) 05:01:36 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x5002b}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 05:01:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f00000002c0)) 05:01:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000000)={0x10}, 0xc) 05:01:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ppoll(&(0x7f0000000040), 0x0, &(0x7f0000000100), &(0x7f0000000140), 0x8) 05:01:36 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000040)) accept4$packet(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x14, 0x0) 05:01:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f00000002c0)) 05:01:36 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000540)}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 05:01:36 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) accept4$packet(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x14, 0x0) 05:01:37 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$packet(0x11, 0x0, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f0000009080), 0x0, 0x0, &(0x7f0000009140)) 05:01:37 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000580), 0x4) 05:01:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000080)=""/25, 0x19, 0x0, &(0x7f00000000c0)) 05:01:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000000)={0x10}, 0xc) 05:01:37 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f00000002c0)) 05:01:37 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) accept4$packet(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x14, 0x0) 05:01:37 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ppoll(&(0x7f0000000040), 0x0, &(0x7f0000000100), &(0x7f0000000140), 0x8) 05:01:37 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000540)}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) [ 335.331717] audit: type=1326 audit(1529730097.330:631): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21672 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:37 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000540)}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) [ 335.388269] audit: type=1326 audit(1529730097.355:632): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21681 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:37 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) accept4$packet(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x14, 0x0) 05:01:37 executing program 3: creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000580), 0x4) 05:01:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000080)=""/25, 0x19, 0x0, &(0x7f00000000c0)) 05:01:37 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ppoll(&(0x7f0000000040), 0x0, &(0x7f0000000100), &(0x7f0000000140), 0x8) 05:01:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000000)={0x10}, 0xc) 05:01:37 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x5002b}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 05:01:37 executing program 3: creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000580), 0x4) 05:01:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$packet(0x11, 0x0, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f0000009080), 0x0, 0x0, &(0x7f0000009140)) 05:01:38 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) accept4$packet(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x14, 0x0) 05:01:38 executing program 4: getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000080)=""/25, 0x19, 0x0, &(0x7f00000000c0)) 05:01:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ppoll(&(0x7f0000000040), 0x0, &(0x7f0000000100), &(0x7f0000000140), 0x8) 05:01:38 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x5002b}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 05:01:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) bind$netlink(0xffffffffffffffff, &(0x7f0000000000)={0x10}, 0xc) 05:01:38 executing program 3: creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000580), 0x4) 05:01:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f00000002c0)) [ 336.276363] audit: type=1326 audit(1529730098.275:633): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21718 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:38 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x5002b}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 05:01:38 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000580), 0x4) [ 336.370991] audit: type=1326 audit(1529730098.322:634): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21725 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:38 executing program 4: getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000080)=""/25, 0x19, 0x0, &(0x7f00000000c0)) 05:01:38 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) accept4$packet(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x14, 0x0) 05:01:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) ppoll(&(0x7f0000000040), 0x0, &(0x7f0000000100), &(0x7f0000000140), 0x8) 05:01:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) bind$netlink(0xffffffffffffffff, &(0x7f0000000000)={0x10}, 0xc) 05:01:38 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 05:01:38 executing program 4: getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000080)=""/25, 0x19, 0x0, &(0x7f00000000c0)) [ 336.650895] audit: type=1326 audit(1529730098.642:635): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21754 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:39 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) accept4$packet(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x14, 0x0) 05:01:39 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000580), 0x4) 05:01:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) ppoll(&(0x7f0000000040), 0x0, &(0x7f0000000100), &(0x7f0000000140), 0x8) 05:01:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) bind$netlink(0xffffffffffffffff, &(0x7f0000000000)={0x10}, 0xc) 05:01:39 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000080)=""/25, 0x19, 0x0, &(0x7f00000000c0)) 05:01:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) getrlimit(0x0, &(0x7f0000000100)) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000140)) 05:01:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f00000002c0)) 05:01:39 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000080)=""/25, 0x19, 0x0, &(0x7f00000000c0)) 05:01:39 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023e}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) accept4$packet(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x14, 0x0) 05:01:39 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000580), 0x4) 05:01:39 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000000)={0x10}, 0xc) 05:01:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) ppoll(&(0x7f0000000040), 0x0, &(0x7f0000000100), &(0x7f0000000140), 0x8) [ 337.418826] audit: type=1326 audit(1529730099.417:636): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21787 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:39 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000080)=""/25, 0x19, 0x0, &(0x7f00000000c0)) 05:01:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000000)) 05:01:39 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 05:01:39 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000000)={0x10}, 0xc) 05:01:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000580), 0x4) 05:01:39 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023e}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) accept4$packet(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x14, 0x0) 05:01:39 executing program 1: openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ppoll(&(0x7f0000000040), 0x0, &(0x7f0000000100), &(0x7f0000000140), 0x8) 05:01:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000080)=""/25, 0x19, 0x0, &(0x7f00000000c0)) 05:01:39 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000000)={0x10}, 0xc) [ 337.711595] audit: type=1326 audit(1529730099.710:637): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21816 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000580), 0x4) 05:01:40 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000000)={0x10}, 0xc) 05:01:40 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023e}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) accept4$packet(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x14, 0x0) 05:01:40 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000000)) 05:01:40 executing program 1: openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ppoll(&(0x7f0000000040), 0x0, &(0x7f0000000100), &(0x7f0000000140), 0x8) 05:01:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000140)={0x0, {{0x2, 0x0, @multicast1=0xe0000001}}}, 0x88) 05:01:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000080)=""/25, 0x19, 0x0, &(0x7f00000000c0)) 05:01:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000580), 0x4) 05:01:40 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000000)={0x10}, 0xc) 05:01:40 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 05:01:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000580), 0x4) 05:01:40 executing program 1: openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ppoll(&(0x7f0000000040), 0x0, &(0x7f0000000100), &(0x7f0000000140), 0x8) 05:01:40 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) accept4$packet(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x14, 0x0) 05:01:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000080)=""/25, 0x19, 0x0, &(0x7f00000000c0)) 05:01:40 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000000)) 05:01:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) eventfd2(0x0, 0x0) 05:01:40 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000000)={0x10}, 0xc) [ 338.651746] audit: type=1326 audit(1529730100.650:638): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21867 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000000)={0x10}, 0xc) 05:01:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000080)=""/25, 0x19, 0x0, &(0x7f00000000c0)) 05:01:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000580), 0x4) 05:01:40 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ppoll(&(0x7f0000000040), 0x0, &(0x7f0000000100), &(0x7f0000000140), 0x8) 05:01:40 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000000)) 05:01:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5002e}]}) msgget$private(0x0, 0x0) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000280)=""/4096) 05:01:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000000)={0x10}, 0xc) 05:01:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000080)=""/25, 0x19, 0x0, &(0x7f00000000c0)) 05:01:41 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) accept4$packet(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x14, 0x0) 05:01:41 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ppoll(&(0x7f0000000040), 0x0, &(0x7f0000000100), &(0x7f0000000140), 0x8) 05:01:41 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000000)) 05:01:41 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000580), 0x4) 05:01:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) 05:01:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000080)=""/25, 0x19, 0x0, &(0x7f00000000c0)) 05:01:41 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5002e}]}) msgget$private(0x0, 0x0) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000280)=""/4096) 05:01:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000000)={0x10}, 0xc) [ 339.613385] kauditd_printk_skb: 1 callbacks suppressed [ 339.613405] audit: type=1326 audit(1529730101.612:640): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21915 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000000)={0x10}, 0xc) 05:01:41 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ppoll(&(0x7f0000000040), 0x0, &(0x7f0000000100), &(0x7f0000000140), 0x8) 05:01:41 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000580), 0x4) 05:01:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000080)=""/25, 0x19, 0x0, &(0x7f00000000c0)) 05:01:41 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5002e}]}) msgget$private(0x0, 0x0) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000280)=""/4096) 05:01:41 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000000)) 05:01:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) [ 339.885293] audit: type=1326 audit(1529730101.882:641): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21941 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:41 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ppoll(&(0x7f0000000040), 0x0, &(0x7f0000000100), &(0x7f0000000140), 0x8) [ 339.994926] audit: type=1326 audit(1529730101.931:642): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21944 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:42 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) accept4$packet(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x14, 0x0) 05:01:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000000)={0x10}, 0xc) 05:01:42 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5002e}]}) msgget$private(0x0, 0x0) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000280)=""/4096) 05:01:42 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000000)) 05:01:42 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ppoll(&(0x7f0000000040), 0x0, &(0x7f0000000100), &(0x7f0000000140), 0x8) 05:01:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) 05:01:42 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ppoll(&(0x7f0000000040), 0x0, &(0x7f0000000100), &(0x7f0000000140), 0x8) [ 340.592482] audit: type=1326 audit(1529730102.589:643): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21974 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000000)={0x10}, 0xc) 05:01:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) 05:01:42 executing program 0: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000000)) 05:01:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000580), 0x4) 05:01:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000080)=""/25, 0x19, 0x0, &(0x7f00000000c0)) 05:01:42 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5002e}]}) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000280)=""/4096) 05:01:42 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505a7}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ppoll(&(0x7f0000000040), 0x0, &(0x7f0000000100), &(0x7f0000000140), 0x8) 05:01:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000000)={0x10}, 0xc) 05:01:42 executing program 0: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000000)) [ 340.948136] audit: type=1326 audit(1529730102.946:644): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21994 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 341.011215] audit: type=1326 audit(1529730102.978:645): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21996 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 341.031142] audit: type=1326 audit(1529730102.999:646): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22004 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505a7}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ppoll(&(0x7f0000000040), 0x0, &(0x7f0000000100), &(0x7f0000000140), 0x8) 05:01:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5002e}]}) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000280)=""/4096) 05:01:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) 05:01:43 executing program 0: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000000)) 05:01:43 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) getpgid(0xffffffffffffffff) remap_file_pages(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) 05:01:43 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000000)) 05:01:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505a7}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ppoll(&(0x7f0000000040), 0x0, &(0x7f0000000100), &(0x7f0000000140), 0x8) 05:01:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) 05:01:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5002e}]}) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000280)=""/4096) [ 341.678479] mmap: syz-executor6 (22029) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.txt. 05:01:43 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000000)) 05:01:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000580), 0x4) 05:01:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000080)=""/25, 0x19, 0x0, &(0x7f00000000c0)) 05:01:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ppoll(&(0x7f0000000040), 0x0, &(0x7f0000000100), &(0x7f0000000140), 0x8) 05:01:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) 05:01:43 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) getpgid(0xffffffffffffffff) remap_file_pages(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) 05:01:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000000)={0x10}, 0xc) 05:01:43 executing program 7: msgget$private(0x0, 0x0) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000280)=""/4096) [ 341.928107] audit: type=1326 audit(1529730103.926:647): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22048 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:43 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000000)) [ 342.008815] audit: type=1326 audit(1529730104.006:648): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22056 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:44 executing program 7: msgget$private(0x0, 0x0) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000280)=""/4096) 05:01:44 executing program 5: syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) [ 342.088008] audit: type=1326 audit(1529730104.068:649): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22054 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000000)) 05:01:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) getpgid(0xffffffffffffffff) remap_file_pages(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) 05:01:44 executing program 5: syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) 05:01:44 executing program 7: msgget$private(0x0, 0x0) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000280)=""/4096) 05:01:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000000)) 05:01:44 executing program 5: syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) 05:01:44 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) 05:01:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000000)={0x10}, 0xc) 05:01:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000000)) 05:01:44 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5002e}]}) msgget$private(0x0, 0x0) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000280)=""/4096) 05:01:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) getpgid(0xffffffffffffffff) remap_file_pages(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) 05:01:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket(0x0, 0x0, 0x0) ioperm(0x0, 0x0, 0x0) 05:01:44 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) 05:01:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ppoll(&(0x7f0000000040), 0x0, &(0x7f0000000100), &(0x7f0000000140), 0x8) 05:01:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, @multicast1}, &(0x7f0000000080)=0x10) 05:01:45 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) 05:01:45 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5002e}]}) msgget$private(0x0, 0x0) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000280)=""/4096) 05:01:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50030}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000000)) 05:01:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) remap_file_pages(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) 05:01:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket(0x0, 0x0, 0x0) ioperm(0x0, 0x0, 0x0) 05:01:45 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, @multicast1}, &(0x7f0000000080)=0x10) 05:01:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50030}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000000)) 05:01:45 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5002e}]}) msgget$private(0x0, 0x0) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000280)=""/4096) 05:01:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) remap_file_pages(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) 05:01:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket(0x0, 0x0, 0x0) ioperm(0x0, 0x0, 0x0) 05:01:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) 05:01:45 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, @multicast1}, &(0x7f0000000080)=0x10) 05:01:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50030}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000000)) 05:01:45 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ppoll(&(0x7f0000000040), 0x0, &(0x7f0000000100), &(0x7f0000000140), 0x8) 05:01:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) msgget$private(0x0, 0x0) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000280)=""/4096) 05:01:45 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000540)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x500e5}]}) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f00000000c0)={'veth0\x00', {0x2, 0x0, @loopback=0x7f000001}}) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0)=""/204, &(0x7f0000000100)=0xcc) 05:01:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) 05:01:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) msgget$private(0x0, 0x0) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000280)=""/4096) 05:01:46 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000000)) 05:01:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) remap_file_pages(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) 05:01:46 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, @multicast1}, &(0x7f0000000080)=0x10) 05:01:46 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket(0x0, 0x0, 0x0) ioperm(0x0, 0x0, 0x0) 05:01:46 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000540)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x500e5}]}) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f00000000c0)={'veth0\x00', {0x2, 0x0, @loopback=0x7f000001}}) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0)=""/204, &(0x7f0000000100)=0xcc) 05:01:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) msgget$private(0x0, 0x0) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000280)=""/4096) 05:01:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) 05:01:46 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000540)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x500e5}]}) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f00000000c0)={'veth0\x00', {0x2, 0x0, @loopback=0x7f000001}}) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0)=""/204, &(0x7f0000000100)=0xcc) 05:01:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x5002e}]}) msgget$private(0x0, 0x0) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000280)=""/4096) 05:01:46 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) ioperm(0x0, 0x0, 0x0) 05:01:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) 05:01:46 executing program 6: getpgid(0xffffffffffffffff) remap_file_pages(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) 05:01:46 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, @multicast1}, &(0x7f0000000080)=0x10) 05:01:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x100000050224}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000001240)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) 05:01:47 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) 05:01:47 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x5002e}]}) msgget$private(0x0, 0x0) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000280)=""/4096) 05:01:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000000)) 05:01:47 executing program 6: getpgid(0xffffffffffffffff) remap_file_pages(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) 05:01:47 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, @multicast1}, &(0x7f0000000080)=0x10) 05:01:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000540)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x500e5}]}) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f00000000c0)={'veth0\x00', {0x2, 0x0, @loopback=0x7f000001}}) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0)=""/204, &(0x7f0000000100)=0xcc) 05:01:47 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) ioperm(0x0, 0x0, 0x0) 05:01:47 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x100000050224}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000001240)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) [ 345.194901] kauditd_printk_skb: 5 callbacks suppressed [ 345.194925] audit: type=1326 audit(1529730107.193:655): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22242 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:47 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) 05:01:47 executing program 6: getpgid(0xffffffffffffffff) remap_file_pages(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) 05:01:47 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x5002e}]}) msgget$private(0x0, 0x0) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000280)=""/4096) 05:01:47 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) ioperm(0x0, 0x0, 0x0) 05:01:47 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, @multicast1}, &(0x7f0000000080)=0x10) 05:01:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000540)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x500e5}]}) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0)=""/204, &(0x7f0000000100)=0xcc) 05:01:47 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) 05:01:47 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) getpgid(0xffffffffffffffff) remap_file_pages(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) 05:01:47 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x100000050224}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000001240)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) 05:01:47 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) msgget$private(0x0, 0x0) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000280)=""/4096) [ 345.590000] audit: type=1326 audit(1529730107.587:656): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22270 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 345.654818] audit: type=1326 audit(1529730107.629:657): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22276 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000540)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x500e5}]}) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0)=""/204, &(0x7f0000000100)=0xcc) 05:01:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x100000050224}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000001240)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) 05:01:48 executing program 4: shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, @multicast1}, &(0x7f0000000080)=0x10) 05:01:48 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) getpgid(0xffffffffffffffff) remap_file_pages(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) 05:01:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000000)) 05:01:48 executing program 3: socket(0x0, 0x0, 0x0) ioperm(0x0, 0x0, 0x0) 05:01:48 executing program 4: shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, @multicast1}, &(0x7f0000000080)=0x10) 05:01:48 executing program 3: socket(0x0, 0x0, 0x0) ioperm(0x0, 0x0, 0x0) [ 346.187441] audit: type=1326 audit(1529730108.185:658): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22298 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:48 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) getpgid(0xffffffffffffffff) remap_file_pages(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) 05:01:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000540)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x500e5}]}) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0)=""/204, &(0x7f0000000100)=0xcc) 05:01:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x100000050224}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000001240)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) 05:01:48 executing program 4: shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, @multicast1}, &(0x7f0000000080)=0x10) 05:01:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)) getpgid(0xffffffffffffffff) remap_file_pages(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) 05:01:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) 05:01:48 executing program 3: socket(0x0, 0x0, 0x0) ioperm(0x0, 0x0, 0x0) 05:01:48 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) msgget$private(0x0, 0x0) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000280)=""/4096) 05:01:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x100000050224}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000001240)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) [ 346.574927] audit: type=1326 audit(1529730108.573:659): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22332 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 346.660741] audit: type=1326 audit(1529730108.659:660): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22337 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:49 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x100000050224}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000001240)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) 05:01:49 executing program 2: ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f00000000c0)={'veth0\x00', {0x2, 0x0, @loopback=0x7f000001}}) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0)=""/204, &(0x7f0000000100)=0xcc) 05:01:49 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, @multicast1}, &(0x7f0000000080)=0x10) 05:01:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)) getpgid(0xffffffffffffffff) remap_file_pages(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) 05:01:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x500f4}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) keyctl$get_security(0x11, 0x0, &(0x7f0000000280)=""/145, 0x91) 05:01:49 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket(0x0, 0x0, 0x0) ioperm(0x0, 0x0, 0x0) 05:01:49 executing program 2: ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f00000000c0)={'veth0\x00', {0x2, 0x0, @loopback=0x7f000001}}) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0)=""/204, &(0x7f0000000100)=0xcc) 05:01:49 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, @multicast1}, &(0x7f0000000080)=0x10) 05:01:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)) getpgid(0xffffffffffffffff) remap_file_pages(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) 05:01:49 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket(0x0, 0x0, 0x0) ioperm(0x0, 0x0, 0x0) 05:01:49 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000001240)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) 05:01:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x500f4}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) keyctl$get_security(0x11, 0x0, &(0x7f0000000280)=""/145, 0x91) 05:01:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) 05:01:49 executing program 2: ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f00000000c0)={'veth0\x00', {0x2, 0x0, @loopback=0x7f000001}}) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0)=""/204, &(0x7f0000000100)=0xcc) 05:01:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) msgget$private(0x0, 0x0) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000280)=""/4096) 05:01:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505a7}]}) getpgid(0xffffffffffffffff) remap_file_pages(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) 05:01:49 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, @multicast1}, &(0x7f0000000080)=0x10) 05:01:49 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000001240)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) 05:01:49 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket(0x0, 0x0, 0x0) ioperm(0x0, 0x0, 0x0) 05:01:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x500f4}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) keyctl$get_security(0x11, 0x0, &(0x7f0000000280)=""/145, 0x91) 05:01:49 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000540)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x500e5}]}) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f00000000c0)={'veth0\x00', {0x2, 0x0, @loopback=0x7f000001}}) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0)=""/204, &(0x7f0000000100)=0xcc) [ 347.579666] audit: type=1326 audit(1529730109.578:661): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22387 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 347.670991] audit: type=1326 audit(1529730109.669:662): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22401 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:49 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, @multicast1}, &(0x7f0000000080)=0x10) 05:01:49 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000001240)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) 05:01:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505a7}]}) getpgid(0xffffffffffffffff) remap_file_pages(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) 05:01:49 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000540)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x500e5}]}) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f00000000c0)={'veth0\x00', {0x2, 0x0, @loopback=0x7f000001}}) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0)=""/204, &(0x7f0000000100)=0xcc) 05:01:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket(0x0, 0x0, 0x0) ioperm(0x0, 0x0, 0x0) 05:01:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x500f4}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) keyctl$get_security(0x11, 0x0, &(0x7f0000000280)=""/145, 0x91) 05:01:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505a7}]}) getpgid(0xffffffffffffffff) remap_file_pages(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) 05:01:50 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000540)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x500e5}]}) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f00000000c0)={'veth0\x00', {0x2, 0x0, @loopback=0x7f000001}}) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0)=""/204, &(0x7f0000000100)=0xcc) 05:01:50 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x100000050224}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000001240)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) 05:01:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000540)={0x0, &(0x7f00000001c0)}) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f00000000c0)={'veth0\x00', {0x2, 0x0, @loopback=0x7f000001}}) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0)=""/204, &(0x7f0000000100)=0xcc) 05:01:50 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) getpgid(0xffffffffffffffff) remap_file_pages(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) 05:01:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) getuid() sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0xf}}, 0x14}, 0x1}, 0x0) 05:01:50 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, @multicast1}, &(0x7f0000000080)=0x10) 05:01:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket(0x0, 0x0, 0x0) ioperm(0x0, 0x0, 0x0) 05:01:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x500f4}]}) keyctl$get_security(0x11, 0x0, &(0x7f0000000280)=""/145, 0x91) 05:01:50 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x100000050224}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000001240)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) 05:01:50 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) move_pages(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100), 0x0) [ 348.614702] audit: type=1326 audit(1529730110.612:663): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22450 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000540)={0x0, &(0x7f00000001c0)}) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f00000000c0)={'veth0\x00', {0x2, 0x0, @loopback=0x7f000001}}) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0)=""/204, &(0x7f0000000100)=0xcc) 05:01:50 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, @multicast1}, &(0x7f0000000080)=0x10) 05:01:50 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x100000050224}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000001240)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) 05:01:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket(0x0, 0x0, 0x0) ioperm(0x0, 0x0, 0x0) 05:01:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x500f4}]}) keyctl$get_security(0x11, 0x0, &(0x7f0000000280)=""/145, 0x91) 05:01:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) getuid() sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0xf}}, 0x14}, 0x1}, 0x0) 05:01:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000540)={0x0, &(0x7f00000001c0)}) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f00000000c0)={'veth0\x00', {0x2, 0x0, @loopback=0x7f000001}}) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0)=""/204, &(0x7f0000000100)=0xcc) 05:01:50 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) move_pages(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100), 0x0) 05:01:50 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501df}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, @multicast1}, &(0x7f0000000080)=0x10) 05:01:51 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x500f4}]}) keyctl$get_security(0x11, 0x0, &(0x7f0000000280)=""/145, 0x91) 05:01:51 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) move_pages(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100), 0x0) 05:01:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000001240)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) 05:01:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) getuid() sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0xf}}, 0x14}, 0x1}, 0x0) 05:01:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) socket(0x0, 0x0, 0x0) ioperm(0x0, 0x0, 0x0) 05:01:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000540)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x500e5}]}) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f00000000c0)={'veth0\x00', {0x2, 0x0, @loopback=0x7f000001}}) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0)=""/204, &(0x7f0000000100)=0xcc) 05:01:51 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) getpgid(0xffffffffffffffff) remap_file_pages(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) 05:01:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501df}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, @multicast1}, &(0x7f0000000080)=0x10) [ 349.599387] audit: type=1326 audit(1529730111.596:664): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22516 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:51 executing program 0: socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) keyctl$get_security(0x11, 0x0, &(0x7f0000000280)=""/145, 0x91) 05:01:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000540)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x500e5}]}) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f00000000c0)={'veth0\x00', {0x2, 0x0, @loopback=0x7f000001}}) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0)=""/204, &(0x7f0000000100)=0xcc) 05:01:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000001240)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) 05:01:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501df}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, @multicast1}, &(0x7f0000000080)=0x10) 05:01:51 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) move_pages(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100), 0x0) 05:01:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) socket(0x0, 0x0, 0x0) ioperm(0x0, 0x0, 0x0) 05:01:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) getuid() sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0xf}}, 0x14}, 0x1}, 0x0) 05:01:51 executing program 0: socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) keyctl$get_security(0x11, 0x0, &(0x7f0000000280)=""/145, 0x91) 05:01:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, @multicast1}, &(0x7f0000000080)=0x10) 05:01:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) getpgid(0xffffffffffffffff) remap_file_pages(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) 05:01:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000540)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x500e5}]}) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f00000000c0)={'veth0\x00', {0x2, 0x0, @loopback=0x7f000001}}) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0)=""/204, &(0x7f0000000100)=0xcc) 05:01:52 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000001240)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) 05:01:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) socket(0x0, 0x0, 0x0) ioperm(0x0, 0x0, 0x0) 05:01:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) move_pages(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100), 0x0) 05:01:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0xf}}, 0x14}, 0x1}, 0x0) 05:01:52 executing program 0: socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) keyctl$get_security(0x11, 0x0, &(0x7f0000000280)=""/145, 0x91) [ 350.583606] kauditd_printk_skb: 1 callbacks suppressed [ 350.583628] audit: type=1326 audit(1529730112.582:666): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22565 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:52 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x500f4}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) keyctl$get_security(0x11, 0x0, &(0x7f0000000280)=""/145, 0x91) 05:01:52 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x100000050224}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000001240)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) 05:01:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000540)={0x1, &(0x7f00000001c0)=[{0x6}]}) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f00000000c0)={'veth0\x00', {0x2, 0x0, @loopback=0x7f000001}}) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0)=""/204, &(0x7f0000000100)=0xcc) 05:01:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0xf}}, 0x14}, 0x1}, 0x0) 05:01:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket(0x0, 0x0, 0x0) ioperm(0x0, 0x0, 0x0) 05:01:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) move_pages(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100), 0x0) [ 350.757693] audit: type=1326 audit(1529730112.756:667): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22575 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:52 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x500f4}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) keyctl$get_security(0x11, 0x0, &(0x7f0000000280)=""/145, 0x91) 05:01:52 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x100000050224}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000001240)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) [ 350.837424] audit: type=1326 audit(1529730112.812:668): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22584 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, @multicast1}, &(0x7f0000000080)=0x10) [ 351.024725] audit: type=1326 audit(1529730113.022:669): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22596 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x100000050224}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000001240)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) 05:01:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0xf}}, 0x14}, 0x1}, 0x0) 05:01:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) move_pages(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100), 0x0) 05:01:53 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x500f4}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) keyctl$get_security(0x11, 0x0, &(0x7f0000000280)=""/145, 0x91) 05:01:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, @loopback}, &(0x7f0000000100)=0x10, 0x0) 05:01:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) keyctl$get_security(0x11, 0x0, &(0x7f0000000280)=""/145, 0x91) 05:01:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000001240)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) 05:01:53 executing program 7: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) move_pages(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100), 0x0) 05:01:53 executing program 5: getuid() sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0xf}}, 0x14}, 0x1}, 0x0) 05:01:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000540)={0x1, &(0x7f00000001c0)=[{0x6}]}) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f00000000c0)={'veth0\x00', {0x2, 0x0, @loopback=0x7f000001}}) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0)=""/204, &(0x7f0000000100)=0xcc) [ 351.688833] audit: type=1326 audit(1529730113.687:670): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22619 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, @loopback}, &(0x7f0000000100)=0x10, 0x0) 05:01:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket(0x0, 0x0, 0x0) ioperm(0x0, 0x0, 0x0) 05:01:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) keyctl$get_security(0x11, 0x0, &(0x7f0000000280)=""/145, 0x91) 05:01:53 executing program 7: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) move_pages(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100), 0x0) [ 351.820352] audit: type=1326 audit(1529730113.819:671): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22629 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:53 executing program 5: getuid() sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0xf}}, 0x14}, 0x1}, 0x0) [ 351.899996] audit: type=1326 audit(1529730113.867:672): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22635 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:54 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, @multicast1}, &(0x7f0000000080)=0x10) 05:01:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, @loopback}, &(0x7f0000000100)=0x10, 0x0) 05:01:54 executing program 7: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) move_pages(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100), 0x0) 05:01:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) keyctl$get_security(0x11, 0x0, &(0x7f0000000280)=""/145, 0x91) [ 352.043771] audit: type=1326 audit(1529730114.042:673): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22651 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:54 executing program 5: getuid() sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0xf}}, 0x14}, 0x1}, 0x0) 05:01:54 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) move_pages(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100), 0x0) 05:01:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, @loopback}, &(0x7f0000000100)=0x10, 0x0) 05:01:54 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000001240)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) 05:01:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x500f4}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) keyctl$get_security(0x11, 0x0, &(0x7f0000000280)=""/145, 0x91) 05:01:54 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) getuid() sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0xf}}, 0x14}, 0x1}, 0x0) [ 352.622496] audit: type=1326 audit(1529730114.621:674): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22679 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000540)={0x1, &(0x7f00000001c0)=[{0x6}]}) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f00000000c0)={'veth0\x00', {0x2, 0x0, @loopback=0x7f000001}}) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0)=""/204, &(0x7f0000000100)=0xcc) 05:01:54 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) move_pages(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100), 0x0) 05:01:54 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) getuid() sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0xf}}, 0x14}, 0x1}, 0x0) 05:01:54 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) move_pages(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100), 0x0) 05:01:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, @loopback}, &(0x7f0000000100)=0x10, 0x0) 05:01:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket(0x0, 0x0, 0x0) ioperm(0x0, 0x0, 0x0) [ 352.734757] audit: type=1326 audit(1529730114.733:675): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22686 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) move_pages(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100), 0x0) 05:01:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, @loopback}, &(0x7f0000000100)=0x10, 0x0) 05:01:54 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) getuid() sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0xf}}, 0x14}, 0x1}, 0x0) 05:01:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x500f4}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) keyctl$get_security(0x11, 0x0, &(0x7f0000000280)=""/145, 0x91) 05:01:54 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) geteuid() 05:01:55 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x500f4}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) keyctl$get_security(0x11, 0x0, &(0x7f0000000280)=""/145, 0x91) 05:01:55 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) getuid() sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0xf}}, 0x14}, 0x1}, 0x0) 05:01:55 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000001240)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) 05:01:55 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) move_pages(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100), 0x0) 05:01:55 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, @loopback}, &(0x7f0000000100)=0x10, 0x0) 05:01:55 executing program 6: shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, @loopback}, &(0x7f0000000100)=0x10, 0x0) 05:01:55 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) getuid() sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0xf}}, 0x14}, 0x1}, 0x0) 05:01:55 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) getrandom(&(0x7f0000000280)=""/249, 0xf9, 0x0) 05:01:55 executing program 6: shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, @loopback}, &(0x7f0000000100)=0x10, 0x0) 05:01:55 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) keyctl$get_security(0x11, 0x0, &(0x7f0000000280)=""/145, 0x91) 05:01:55 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) move_pages(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100), 0x0) 05:01:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000840)={&(0x7f0000000600)={0x14}, 0x14}, 0x1}, 0x0) 05:01:55 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) getuid() sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0xf}}, 0x14}, 0x1}, 0x0) 05:01:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe(&(0x7f0000000040)) sendmmsg(0xffffffffffffffff, &(0x7f0000004440), 0x0, 0x0) 05:01:55 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) getrandom(&(0x7f0000000280)=""/249, 0xf9, 0x0) 05:01:55 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50030}]}) getuid() sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0xf}}, 0x14}, 0x1}, 0x0) 05:01:55 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) move_pages(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100), 0x0) 05:01:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000840)={&(0x7f0000000600)={0x14}, 0x14}, 0x1}, 0x0) 05:01:56 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000840)={&(0x7f0000000600)={0x14}, 0x14}, 0x1}, 0x0) 05:01:56 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50030}]}) getuid() sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0xf}}, 0x14}, 0x1}, 0x0) 05:01:56 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) move_pages(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100), 0x0) 05:01:56 executing program 6: shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, @loopback}, &(0x7f0000000100)=0x10, 0x0) 05:01:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) getrandom(&(0x7f0000000280)=""/249, 0xf9, 0x0) 05:01:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe(&(0x7f0000000040)) sendmmsg(0xffffffffffffffff, &(0x7f0000004440), 0x0, 0x0) 05:01:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f00000000c0)) 05:01:56 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) move_pages(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100), 0x0) 05:01:56 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000840)={&(0x7f0000000600)={0x14}, 0x14}, 0x1}, 0x0) 05:01:56 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, @loopback}, &(0x7f0000000100)=0x10, 0x0) 05:01:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) getrandom(&(0x7f0000000280)=""/249, 0xf9, 0x0) 05:01:56 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50030}]}) getuid() sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0xf}}, 0x14}, 0x1}, 0x0) 05:01:56 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) openat$ipvs(0xffffffffffffff9c, &(0x7f0000001240)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) 05:01:56 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) keyctl$get_security(0x11, 0x0, &(0x7f0000000280)=""/145, 0x91) 05:01:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe(&(0x7f0000000040)) sendmmsg(0xffffffffffffffff, &(0x7f0000004440), 0x0, 0x0) 05:01:56 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, @loopback}, &(0x7f0000000100)=0x10, 0x0) 05:01:56 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) move_pages(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100), 0x0) 05:01:56 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) getuid() sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0xf}}, 0x14}, 0x1}, 0x0) 05:01:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) getrandom(&(0x7f0000000280)=""/249, 0xf9, 0x0) 05:01:56 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) openat$ipvs(0xffffffffffffff9c, &(0x7f0000001240)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) 05:01:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe(&(0x7f0000000040)) sendmmsg(0xffffffffffffffff, &(0x7f0000004440), 0x0, 0x0) 05:01:56 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000840)={&(0x7f0000000600)={0x14}, 0x14}, 0x1}, 0x0) 05:01:57 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, @loopback}, &(0x7f0000000100)=0x10, 0x0) 05:01:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000840)={&(0x7f0000000600)={0x14}, 0x14}, 0x1}, 0x0) 05:01:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) keyctl$get_security(0x11, 0x0, &(0x7f0000000280)=""/145, 0x91) 05:01:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, @loopback}, &(0x7f0000000100)=0x10, 0x0) 05:01:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) getrandom(&(0x7f0000000280)=""/249, 0xf9, 0x0) 05:01:57 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) openat$ipvs(0xffffffffffffff9c, &(0x7f0000001240)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) 05:01:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) sendmmsg(0xffffffffffffffff, &(0x7f0000004440), 0x0, 0x0) 05:01:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000840)={&(0x7f0000000600)={0x14}, 0x14}, 0x1}, 0x0) [ 355.793820] kauditd_printk_skb: 6 callbacks suppressed [ 355.793841] audit: type=1326 audit(1529730117.792:682): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22856 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:57 executing program 2: msgget$private(0x0, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000840)={&(0x7f0000000600)={0x14}, 0x14}, 0x1}, 0x0) 05:01:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, @loopback}, &(0x7f0000000100)=0x10, 0x0) 05:01:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) move_pages(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100), 0x0) 05:01:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) keyctl$session_to_parent(0x12) 05:01:58 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) getrandom(&(0x7f0000000280)=""/249, 0xf9, 0x0) 05:01:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) sendmmsg(0xffffffffffffffff, &(0x7f0000004440), 0x0, 0x0) 05:01:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) getuid() sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0xf}}, 0x14}, 0x1}, 0x0) 05:01:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, @loopback}, &(0x7f0000000100)=0x10, 0x0) [ 356.070196] audit: type=1326 audit(1529730118.068:683): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22880 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:58 executing program 2: msgget$private(0x0, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000840)={&(0x7f0000000600)={0x14}, 0x14}, 0x1}, 0x0) [ 356.142473] audit: type=1326 audit(1529730118.125:684): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22888 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:58 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) getrandom(&(0x7f0000000280)=""/249, 0xf9, 0x0) 05:01:58 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) getrandom(&(0x7f0000000280)=""/249, 0xf9, 0x0) 05:01:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501df}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, @loopback}, &(0x7f0000000100)=0x10, 0x0) 05:01:58 executing program 2: msgget$private(0x0, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000840)={&(0x7f0000000600)={0x14}, 0x14}, 0x1}, 0x0) 05:01:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) sendmmsg(0xffffffffffffffff, &(0x7f0000004440), 0x0, 0x0) 05:01:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) keyctl$session_to_parent(0x12) 05:01:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) rt_sigaction(0x0, &(0x7f0000000080), &(0x7f0000000100), 0x8, &(0x7f00000001c0)) llistxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)=""/107, 0x6b) 05:01:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501df}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, @loopback}, &(0x7f0000000100)=0x10, 0x0) 05:01:58 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000840)={&(0x7f0000000600)={0x14}, 0x14}, 0x1}, 0x0) 05:01:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) move_pages(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100), 0x0) 05:01:59 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) getrandom(&(0x7f0000000280)=""/249, 0xf9, 0x0) 05:01:59 executing program 3: pipe(&(0x7f0000000040)) sendmmsg(0xffffffffffffffff, &(0x7f0000004440), 0x0, 0x0) 05:01:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) keyctl$session_to_parent(0x12) 05:01:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) rt_sigaction(0x0, &(0x7f0000000080), &(0x7f0000000100), 0x8, &(0x7f00000001c0)) llistxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)=""/107, 0x6b) 05:01:59 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501df}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, @loopback}, &(0x7f0000000100)=0x10, 0x0) 05:01:59 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000840)={&(0x7f0000000600)={0x14}, 0x14}, 0x1}, 0x0) 05:01:59 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) getuid() sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0xf}}, 0x14}, 0x1}, 0x0) [ 357.087134] audit: type=1326 audit(1529730119.085:685): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22936 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:59 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000840)={&(0x7f0000000600)={0x14}, 0x14}, 0x1}, 0x0) 05:01:59 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) getrandom(&(0x7f0000000280)=""/249, 0xf9, 0x0) 05:01:59 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, @loopback}, &(0x7f0000000100)=0x10, 0x0) [ 357.164318] audit: type=1326 audit(1529730119.124:686): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22950 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:59 executing program 3: pipe(&(0x7f0000000040)) sendmmsg(0xffffffffffffffff, &(0x7f0000004440), 0x0, 0x0) 05:01:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) 05:01:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) keyctl$session_to_parent(0x12) [ 357.291718] audit: type=1326 audit(1529730119.283:687): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22961 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:01:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) msgget$private(0x0, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000840)={&(0x7f0000000600)={0x14}, 0x14}, 0x1}, 0x0) 05:01:59 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) getrandom(&(0x7f0000000280)=""/249, 0xf9, 0x0) 05:02:00 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) socket$nl_netfilter(0x10, 0x3, 0xc) 05:02:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) msgget$private(0x0, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000840)={&(0x7f0000000600)={0x14}, 0x14}, 0x1}, 0x0) 05:02:00 executing program 3: pipe(&(0x7f0000000040)) sendmmsg(0xffffffffffffffff, &(0x7f0000004440), 0x0, 0x0) 05:02:00 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) keyctl$session_to_parent(0x12) 05:02:00 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) 05:02:00 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) getrandom(&(0x7f0000000280)=""/249, 0xf9, 0x0) 05:02:00 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]}) seccomp(0x0, 0x0, &(0x7f0000000340)={0x2000000000000172, &(0x7f0000000380)}) prctl$getreaper(0x0, &(0x7f0000000040)) 05:02:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) msgget$private(0x0, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000840)={&(0x7f0000000600)={0x14}, 0x14}, 0x1}, 0x0) 05:02:00 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe(&(0x7f0000000040)) sendmmsg(0xffffffffffffffff, &(0x7f0000004440), 0x0, 0x0) 05:02:00 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) getrandom(&(0x7f0000000280)=""/249, 0xf9, 0x0) 05:02:00 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, @loopback}, &(0x7f0000000100)=0x10, 0x0) 05:02:00 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) keyctl$session_to_parent(0x12) 05:02:00 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) 05:02:00 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe(&(0x7f0000000040)) sendmmsg(0xffffffffffffffff, &(0x7f0000004440), 0x0, 0x0) 05:02:00 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) socket$nl_netfilter(0x10, 0x3, 0xc) 05:02:00 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]}) seccomp(0x0, 0x0, &(0x7f0000000340)={0x2000000000000172, &(0x7f0000000380)}) prctl$getreaper(0x0, &(0x7f0000000040)) [ 358.335513] audit: type=1326 audit(1529730120.334:688): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23016 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000840)={&(0x7f0000000600)={0x14}, 0x14}, 0x1}, 0x0) 05:02:00 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) getrandom(&(0x7f0000000280)=""/249, 0xf9, 0x0) 05:02:00 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) keyctl$session_to_parent(0x12) 05:02:00 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe(&(0x7f0000000040)) sendmmsg(0xffffffffffffffff, &(0x7f0000004440), 0x0, 0x0) 05:02:00 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) 05:02:00 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) getrandom(&(0x7f0000000280)=""/249, 0xf9, 0x0) 05:02:00 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) socket$nl_netfilter(0x10, 0x3, 0xc) 05:02:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000840)={&(0x7f0000000600)={0x14}, 0x14}, 0x1}, 0x0) 05:02:00 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]}) seccomp(0x0, 0x0, &(0x7f0000000340)={0x2000000000000172, &(0x7f0000000380)}) prctl$getreaper(0x0, &(0x7f0000000040)) 05:02:00 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) keyctl$session_to_parent(0x12) 05:02:01 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, @loopback}, &(0x7f0000000100)=0x10, 0x0) 05:02:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) pipe(&(0x7f0000000040)) sendmmsg(0xffffffffffffffff, &(0x7f0000004440), 0x0, 0x0) 05:02:01 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) getrandom(&(0x7f0000000280)=""/249, 0xf9, 0x0) 05:02:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000840)={&(0x7f0000000600)={0x14}, 0x14}, 0x1}, 0x0) 05:02:01 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) 05:02:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) socket$nl_netfilter(0x10, 0x3, 0xc) 05:02:01 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) keyctl$session_to_parent(0x12) 05:02:01 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]}) seccomp(0x0, 0x0, &(0x7f0000000340)={0x2000000000000172, &(0x7f0000000380)}) prctl$getreaper(0x0, &(0x7f0000000040)) 05:02:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) msgget$private(0x0, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000840)={&(0x7f0000000600)={0x14}, 0x14}, 0x1}, 0x0) 05:02:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) pipe(&(0x7f0000000040)) sendmmsg(0xffffffffffffffff, &(0x7f0000004440), 0x0, 0x0) 05:02:01 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) keyctl$session_to_parent(0x12) [ 359.330384] audit: type=1326 audit(1529730121.329:689): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23082 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:01 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) getrandom(&(0x7f0000000280)=""/249, 0xf9, 0x0) 05:02:01 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) 05:02:01 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]}) prctl$getreaper(0x0, &(0x7f0000000040)) 05:02:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) socket$nl_netfilter(0x10, 0x3, 0xc) [ 359.490031] audit: type=1326 audit(1529730121.488:690): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23087 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) pipe(&(0x7f0000000040)) sendmmsg(0xffffffffffffffff, &(0x7f0000004440), 0x0, 0x0) 05:02:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f4}]}) pipe(&(0x7f0000000040)) sendmmsg(0xffffffffffffffff, &(0x7f0000004440), 0x0, 0x0) 05:02:02 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) keyctl$session_to_parent(0x12) 05:02:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) getrandom(&(0x7f0000000280)=""/249, 0xf9, 0x0) 05:02:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) 05:02:02 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]}) prctl$getreaper(0x0, &(0x7f0000000040)) 05:02:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) socket$nl_netfilter(0x10, 0x3, 0xc) 05:02:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 05:02:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) getrandom(&(0x7f0000000280)=""/249, 0xf9, 0x0) 05:02:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) msgget$private(0x0, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000840)={&(0x7f0000000600)={0x14}, 0x14}, 0x1}, 0x0) 05:02:02 executing program 0: getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) 05:02:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f4}]}) pipe(&(0x7f0000000040)) sendmmsg(0xffffffffffffffff, &(0x7f0000004440), 0x0, 0x0) 05:02:02 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) keyctl$session_to_parent(0x12) 05:02:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) socket$nl_netfilter(0x10, 0x3, 0xc) 05:02:02 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]}) prctl$getreaper(0x0, &(0x7f0000000040)) 05:02:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 360.503266] audit: type=1326 audit(1529730122.501:691): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23134 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f4}]}) pipe(&(0x7f0000000040)) sendmmsg(0xffffffffffffffff, &(0x7f0000004440), 0x0, 0x0) 05:02:02 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) keyctl$session_to_parent(0x12) 05:02:02 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000340)={0x2000000000000172, &(0x7f0000000380)}) prctl$getreaper(0x0, &(0x7f0000000040)) 05:02:02 executing program 0: getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) 05:02:02 executing program 5: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) socket$nl_netfilter(0x10, 0x3, 0xc) 05:02:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 05:02:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe(&(0x7f0000000040)) sendmmsg(0xffffffffffffffff, &(0x7f0000004440), 0x0, 0x0) 05:02:02 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000340)={0x2000000000000172, &(0x7f0000000380)}) prctl$getreaper(0x0, &(0x7f0000000040)) [ 360.860510] kauditd_printk_skb: 1 callbacks suppressed [ 360.860529] audit: type=1326 audit(1529730122.858:693): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23174 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) getrandom(&(0x7f0000000280)=""/249, 0xf9, 0x0) 05:02:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) msgget$private(0x0, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000840)={&(0x7f0000000600)={0x14}, 0x14}, 0x1}, 0x0) 05:02:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) keyctl$session_to_parent(0x12) 05:02:03 executing program 0: getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) 05:02:03 executing program 5: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) socket$nl_netfilter(0x10, 0x3, 0xc) 05:02:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 05:02:03 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000340)={0x2000000000000172, &(0x7f0000000380)}) prctl$getreaper(0x0, &(0x7f0000000040)) [ 361.366721] audit: type=1326 audit(1529730123.365:694): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23186 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) keyctl$session_to_parent(0x12) [ 361.478449] audit: type=1326 audit(1529730123.476:695): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23199 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:03 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) 05:02:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 05:02:03 executing program 5: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) socket$nl_netfilter(0x10, 0x3, 0xc) 05:02:03 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]}) seccomp(0x0, 0x0, &(0x7f0000000340)={0x2000000000000172, &(0x7f0000000380)}) prctl$getreaper(0x0, &(0x7f0000000040)) 05:02:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) keyctl$session_to_parent(0x12) 05:02:03 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) 05:02:03 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe(&(0x7f0000000040)) sendmmsg(0xffffffffffffffff, &(0x7f0000004440), 0x0, 0x0) 05:02:03 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) [ 361.895169] audit: type=1326 audit(1529730123.893:696): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23232 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) getrandom(&(0x7f0000000280)=""/249, 0xf9, 0x0) [ 362.297134] audit: type=1326 audit(1529730124.295:697): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23238 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:04 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) socket$nl_netfilter(0x10, 0x3, 0xc) 05:02:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 05:02:04 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) keyctl$session_to_parent(0x12) 05:02:04 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]}) seccomp(0x0, 0x0, &(0x7f0000000340)={0x2000000000000172, &(0x7f0000000380)}) prctl$getreaper(0x0, &(0x7f0000000040)) 05:02:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) 05:02:04 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) wait4(0x0, 0x0, 0x0, &(0x7f0000000080)) 05:02:04 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) socket$nl_netfilter(0x10, 0x3, 0xc) 05:02:04 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]}) seccomp(0x0, 0x0, &(0x7f0000000340)={0x2000000000000172, &(0x7f0000000380)}) prctl$getreaper(0x0, &(0x7f0000000040)) 05:02:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) 05:02:04 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) keyctl$session_to_parent(0x12) 05:02:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 05:02:04 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) socket$nl_netfilter(0x10, 0x3, 0xc) 05:02:04 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) wait4(0x0, 0x0, 0x0, &(0x7f0000000080)) 05:02:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe(&(0x7f0000000040)) sendmmsg(0xffffffffffffffff, &(0x7f0000004440), 0x0, 0x0) 05:02:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000140)}) seccomp(0x0, 0x0, &(0x7f0000000340)={0x2000000000000172, &(0x7f0000000380)}) prctl$getreaper(0x0, &(0x7f0000000040)) [ 362.884912] audit: type=1326 audit(1529730124.883:698): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23284 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) wait4(0x0, 0x0, 0x0, &(0x7f0000000080)) 05:02:05 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) 05:02:05 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) keyctl$session_to_parent(0x12) 05:02:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) socket$nl_netfilter(0x10, 0x3, 0xc) 05:02:05 executing program 6: socket$nl_xfrm(0x10, 0x3, 0x6) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 05:02:05 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000140)}) seccomp(0x0, 0x0, &(0x7f0000000340)={0x2000000000000172, &(0x7f0000000380)}) prctl$getreaper(0x0, &(0x7f0000000040)) 05:02:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) 05:02:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) socket$nl_netfilter(0x10, 0x3, 0xc) 05:02:05 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000140)}) seccomp(0x0, 0x0, &(0x7f0000000340)={0x2000000000000172, &(0x7f0000000380)}) prctl$getreaper(0x0, &(0x7f0000000040)) 05:02:05 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) keyctl$session_to_parent(0x12) 05:02:05 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) 05:02:05 executing program 6: socket$nl_xfrm(0x10, 0x3, 0x6) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 05:02:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) wait4(0x0, 0x0, 0x0, &(0x7f0000000080)) [ 363.454238] audit: type=1326 audit(1529730125.451:699): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23312 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) 05:02:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) 05:02:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) socket$nl_netfilter(0x10, 0x3, 0xc) 05:02:05 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5022b}]}) seccomp(0x0, 0x0, &(0x7f0000000340)={0x2000000000000172, &(0x7f0000000380)}) prctl$getreaper(0x0, &(0x7f0000000040)) 05:02:05 executing program 6: socket$nl_xfrm(0x10, 0x3, 0x6) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 05:02:05 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) 05:02:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) wait4(0x0, 0x0, 0x0, &(0x7f0000000080)) 05:02:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000000)) 05:02:05 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) 05:02:05 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 05:02:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) socket$nl_netfilter(0x10, 0x3, 0xc) 05:02:05 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5022b}]}) seccomp(0x0, 0x0, &(0x7f0000000340)={0x2000000000000172, &(0x7f0000000380)}) prctl$getreaper(0x0, &(0x7f0000000040)) 05:02:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) keyctl$session_to_parent(0x12) 05:02:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) wait4(0x0, 0x0, 0x0, &(0x7f0000000080)) 05:02:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) 05:02:06 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5022b}]}) seccomp(0x0, 0x0, &(0x7f0000000340)={0x2000000000000172, &(0x7f0000000380)}) prctl$getreaper(0x0, &(0x7f0000000040)) 05:02:06 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) 05:02:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) socket$nl_netfilter(0x10, 0x3, 0xc) 05:02:06 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 05:02:06 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000340)) [ 364.368741] audit: type=1326 audit(1529730126.367:700): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23374 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:06 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000340)={0x2000000000000172, &(0x7f0000000380)}) prctl$getreaper(0x0, &(0x7f0000000040)) 05:02:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) socket$nl_netfilter(0x10, 0x3, 0xc) 05:02:06 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 364.456776] audit: type=1326 audit(1529730126.422:701): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23385 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) wait4(0x0, 0x0, 0x0, &(0x7f0000000080)) 05:02:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) [ 364.585393] audit: type=1326 audit(1529730126.578:702): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23392 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:06 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000340)) 05:02:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) socket$nl_netfilter(0x10, 0x3, 0xc) 05:02:06 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$nl_xfrm(0x10, 0x3, 0x6) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 05:02:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) 05:02:07 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000340)) 05:02:07 executing program 2: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) wait4(0x0, 0x0, 0x0, &(0x7f0000000080)) 05:02:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$nl_xfrm(0x10, 0x3, 0x6) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 05:02:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) keyctl$session_to_parent(0x12) 05:02:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) 05:02:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) 05:02:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$nl_xfrm(0x10, 0x3, 0x6) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 05:02:07 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000340)={0x2000000000000172, &(0x7f0000000380)}) prctl$getreaper(0x0, &(0x7f0000000040)) 05:02:07 executing program 2: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) wait4(0x0, 0x0, 0x0, &(0x7f0000000080)) 05:02:07 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000340)) 05:02:07 executing program 4: msgget$private(0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) 05:02:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 05:02:07 executing program 2: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) wait4(0x0, 0x0, 0x0, &(0x7f0000000080)) 05:02:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) socket$nl_netfilter(0x10, 0x3, 0xc) 05:02:07 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) fstat(0xffffffffffffffff, &(0x7f0000000340)) 05:02:07 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) wait4(0x0, 0x0, 0x0, &(0x7f0000000080)) 05:02:08 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) 05:02:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 05:02:08 executing program 4: msgget$private(0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) 05:02:08 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) fstat(0xffffffffffffffff, &(0x7f0000000340)) 05:02:08 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) wait4(0x0, 0x0, 0x0, &(0x7f0000000080)) 05:02:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) alarm(0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140), 0x10) [ 366.350439] kauditd_printk_skb: 5 callbacks suppressed [ 366.350461] audit: type=1326 audit(1529730128.349:708): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23475 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 05:02:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000340)={0x2000000000000172, &(0x7f0000000380)}) prctl$getreaper(0x0, &(0x7f0000000040)) 05:02:08 executing program 4: msgget$private(0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) 05:02:08 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) wait4(0x0, 0x0, 0x0, &(0x7f0000000080)) 05:02:08 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) fstat(0xffffffffffffffff, &(0x7f0000000340)) 05:02:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) alarm(0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140), 0x10) 05:02:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$nl_xfrm(0x10, 0x3, 0x6) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 366.652155] audit: type=1326 audit(1529730128.650:709): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23505 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) socket$nl_netfilter(0x10, 0x3, 0xc) 05:02:08 executing program 3: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000340)) 05:02:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) wait4(0x0, 0x0, 0x0, &(0x7f0000000080)) [ 366.716256] audit: type=1326 audit(1529730128.693:710): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23509 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 366.785222] audit: type=1326 audit(1529730128.783:711): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23515 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) wait4(0x0, 0x0, 0x0, &(0x7f0000000080)) 05:02:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) alarm(0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140), 0x10) 05:02:09 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) 05:02:09 executing program 3: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000340)) 05:02:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) memfd_create(&(0x7f0000000180)='self\x00', 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 05:02:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) wait4(0x0, 0x0, 0x0, &(0x7f0000000080)) 05:02:09 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) 05:02:09 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) 05:02:09 executing program 3: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000340)) 05:02:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505a7}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) wait4(0x0, 0x0, 0x0, &(0x7f0000000080)) 05:02:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) alarm(0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140), 0x10) 05:02:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) memfd_create(&(0x7f0000000180)='self\x00', 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 05:02:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$nl_xfrm(0x10, 0x3, 0x6) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 05:02:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140), 0x10) 05:02:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) alarm(0x0) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) 05:02:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505a7}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) wait4(0x0, 0x0, 0x0, &(0x7f0000000080)) 05:02:09 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000340)) 05:02:09 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) msgget$private(0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) [ 367.703413] audit: type=1326 audit(1529730129.701:712): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23563 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) memfd_create(&(0x7f0000000180)='self\x00', 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 05:02:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505a7}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) wait4(0x0, 0x0, 0x0, &(0x7f0000000080)) 05:02:09 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000340)) 05:02:09 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) msgget$private(0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) 05:02:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140), 0x10) 05:02:10 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) memfd_create(&(0x7f0000000180)='self\x00', 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 05:02:10 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x500f2}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) 05:02:10 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000340)) 05:02:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) wait4(0x0, 0x0, 0x0, &(0x7f0000000080)) 05:02:10 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) msgget$private(0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) [ 368.141324] audit: type=1326 audit(1529730130.140:713): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23606 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:10 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000340)) 05:02:10 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$nl_xfrm(0x10, 0x3, 0x6) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 05:02:10 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140), 0x10) 05:02:10 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) 05:02:10 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 05:02:10 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x500f2}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) 05:02:10 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) [ 368.662812] audit: type=1326 audit(1529730130.661:714): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23629 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:10 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000340)) 05:02:10 executing program 1: alarm(0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140), 0x10) 05:02:10 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x500f2}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) 05:02:10 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 05:02:10 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) 05:02:10 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000340)) 05:02:10 executing program 1: alarm(0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140), 0x10) 05:02:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) wait4(0x0, 0x0, 0x0, &(0x7f0000000080)) 05:02:11 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 05:02:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) msgget$private(0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) [ 369.130423] audit: type=1326 audit(1529730131.129:715): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23660 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 369.159679] audit: type=1326 audit(1529730131.152:716): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23665 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:11 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50030}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000340)) 05:02:11 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x500f2}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) 05:02:11 executing program 1: alarm(0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140), 0x10) 05:02:11 executing program 0: memfd_create(&(0x7f0000000180)='self\x00', 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 05:02:11 executing program 0: memfd_create(&(0x7f0000000180)='self\x00', 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) [ 369.634214] hrtimer: interrupt took 171543 ns 05:02:11 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50030}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000340)) 05:02:11 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) alarm(0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140), 0x10) 05:02:11 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x500f2}]}) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) 05:02:11 executing program 0: memfd_create(&(0x7f0000000180)='self\x00', 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 05:02:11 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50030}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000340)) 05:02:11 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) alarm(0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140), 0x10) 05:02:11 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50236}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000080), &(0x7f0000000280)=0x4) 05:02:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000300)=""/180, 0xb4, 0x0, &(0x7f00000003c0)=@abs, 0x6e) 05:02:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) wait4(0x0, 0x0, 0x0, &(0x7f0000000080)) 05:02:12 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x500f2}]}) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) 05:02:12 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) memfd_create(&(0x7f0000000180)='self\x00', 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 05:02:12 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000340)) 05:02:12 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) alarm(0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140), 0x10) 05:02:12 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50236}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000080), &(0x7f0000000280)=0x4) 05:02:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000300)=""/180, 0xb4, 0x0, &(0x7f00000003c0)=@abs, 0x6e) 05:02:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) msgget$private(0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) [ 370.149147] audit: type=1326 audit(1529730132.147:717): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23714 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:12 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) memfd_create(&(0x7f0000000180)='self\x00', 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 05:02:12 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x500f2}]}) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) 05:02:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) alarm(0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140), 0x10) 05:02:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000300)=""/180, 0xb4, 0x0, &(0x7f00000003c0)=@abs, 0x6e) 05:02:12 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) memfd_create(&(0x7f0000000180)='self\x00', 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 05:02:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) alarm(0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140), 0x10) 05:02:12 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50236}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000080), &(0x7f0000000280)=0x4) 05:02:12 executing program 7: openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) 05:02:13 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) msgget$private(0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) 05:02:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000300)=""/180, 0xb4, 0x0, &(0x7f00000003c0)=@abs, 0x6e) 05:02:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) memfd_create(&(0x7f0000000180)='self\x00', 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 05:02:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) alarm(0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140), 0x10) 05:02:13 executing program 7: openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) 05:02:13 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50236}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000080), &(0x7f0000000280)=0x4) 05:02:13 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000340)) 05:02:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) get_thread_area(&(0x7f0000000040)) 05:02:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]}) alarm(0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140), 0x10) 05:02:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) memfd_create(&(0x7f0000000180)='self\x00', 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 05:02:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000300)=""/180, 0xb4, 0x0, &(0x7f00000003c0)=@abs, 0x6e) 05:02:13 executing program 7: openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) 05:02:13 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50236}]}) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000080), &(0x7f0000000280)=0x4) 05:02:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) get_thread_area(&(0x7f0000000040)) 05:02:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) memfd_create(&(0x7f0000000180)='self\x00', 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 05:02:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]}) alarm(0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140), 0x10) 05:02:14 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000340)) 05:02:14 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000300)=""/180, 0xb4, 0x0, &(0x7f00000003c0)=@abs, 0x6e) 05:02:14 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x500f2}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) 05:02:14 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50236}]}) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000080), &(0x7f0000000280)=0x4) 05:02:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f4}]}) memfd_create(&(0x7f0000000180)='self\x00', 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 05:02:14 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f0000000040)) 05:02:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]}) alarm(0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140), 0x10) 05:02:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) get_thread_area(&(0x7f0000000040)) [ 372.129541] kauditd_printk_skb: 4 callbacks suppressed [ 372.129563] audit: type=1326 audit(1529730134.128:722): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23820 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) alarm(0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140), 0x10) 05:02:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f4}]}) memfd_create(&(0x7f0000000180)='self\x00', 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 05:02:14 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000300)=""/180, 0xb4, 0x0, &(0x7f00000003c0)=@abs, 0x6e) 05:02:14 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x500f2}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) 05:02:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) get_thread_area(&(0x7f0000000040)) [ 372.257238] audit: type=1326 audit(1529730134.252:723): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23834 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:14 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50236}]}) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000080), &(0x7f0000000280)=0x4) 05:02:14 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x500f2}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) 05:02:14 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f0000000040)) 05:02:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5002e}]}) get_thread_area(&(0x7f0000000040)) 05:02:15 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f4}]}) memfd_create(&(0x7f0000000180)='self\x00', 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 05:02:15 executing program 6: getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000300)=""/180, 0xb4, 0x0, &(0x7f00000003c0)=@abs, 0x6e) 05:02:15 executing program 5: openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000080), &(0x7f0000000280)=0x4) 05:02:15 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f0000000040)) 05:02:15 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f00000001c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) 05:02:15 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 05:02:15 executing program 5: openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000080), &(0x7f0000000280)=0x4) 05:02:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) alarm(0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140), 0x10) 05:02:15 executing program 6: getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000300)=""/180, 0xb4, 0x0, &(0x7f00000003c0)=@abs, 0x6e) 05:02:15 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) memfd_create(&(0x7f0000000180)='self\x00', 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 05:02:15 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f00000001c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) 05:02:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5002e}]}) get_thread_area(&(0x7f0000000040)) 05:02:15 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 05:02:15 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f0000000040)) 05:02:15 executing program 5: openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000080), &(0x7f0000000280)=0x4) [ 373.293742] audit: type=1326 audit(1529730135.292:724): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23890 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:15 executing program 6: getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000300)=""/180, 0xb4, 0x0, &(0x7f00000003c0)=@abs, 0x6e) [ 373.381931] audit: type=1326 audit(1529730135.330:725): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23896 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:15 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f00000001c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) 05:02:15 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50236}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000080), &(0x7f0000000280)=0x4) 05:02:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5002e}]}) get_thread_area(&(0x7f0000000040)) 05:02:15 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f0000000040)) 05:02:15 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 05:02:15 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000300)=""/180, 0xb4, 0x0, &(0x7f00000003c0)=@abs, 0x6e) 05:02:15 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x500f2}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) 05:02:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) alarm(0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140), 0x10) 05:02:16 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) get_thread_area(&(0x7f0000000040)) 05:02:16 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) memfd_create(&(0x7f0000000180)='self\x00', 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 05:02:16 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50236}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000080), &(0x7f0000000280)=0x4) 05:02:16 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000300)=""/180, 0xb4, 0x0, &(0x7f00000003c0)=@abs, 0x6e) 05:02:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 05:02:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f0000000040)) 05:02:16 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x500f2}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) 05:02:16 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) get_thread_area(&(0x7f0000000040)) [ 374.190582] audit: type=1326 audit(1529730136.189:726): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23943 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 374.279307] audit: type=1326 audit(1529730136.277:727): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23953 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:16 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x500f2}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) 05:02:16 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50236}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000080), &(0x7f0000000280)=0x4) 05:02:16 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000300)=""/180, 0xb4, 0x0, &(0x7f00000003c0)=@abs, 0x6e) 05:02:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f0000000040)) 05:02:16 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) get_thread_area(&(0x7f0000000040)) 05:02:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 05:02:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000300)=""/180, 0xb4, 0x0, &(0x7f00000003c0)=@abs, 0x6e) 05:02:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000300)=""/180, 0xb4, 0x0, &(0x7f00000003c0)=@abs, 0x6e) 05:02:17 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000080), &(0x7f0000000280)=0x4) 05:02:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) memfd_create(&(0x7f0000000180)='self\x00', 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 05:02:17 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) 05:02:17 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) get_thread_area(&(0x7f0000000040)) 05:02:17 executing program 4: socket$nl_xfrm(0x10, 0x3, 0x6) nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f0000000040)) 05:02:17 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 05:02:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000280)) 05:02:17 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000080), &(0x7f0000000280)=0x4) 05:02:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000300)=""/180, 0xb4, 0x0, &(0x7f00000003c0)=@abs, 0x6e) 05:02:17 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) get_thread_area(&(0x7f0000000040)) [ 375.235918] audit: type=1326 audit(1529730137.234:728): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23997 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:17 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000080), &(0x7f0000000280)=0x4) 05:02:17 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 05:02:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000300)=""/180, 0xb4, 0x0, &(0x7f00000003c0)=@abs, 0x6e) [ 375.329722] audit: type=1326 audit(1529730137.274:729): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24010 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:17 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) get_thread_area(&(0x7f0000000040)) 05:02:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000040)) vmsplice(0xffffffffffffffff, &(0x7f0000000480), 0x0, 0x0) 05:02:17 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50236}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000080), &(0x7f0000000280)=0x4) 05:02:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000300)=""/180, 0xb4, 0x0, &(0x7f00000003c0)=@abs, 0x6e) 05:02:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) 05:02:18 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 05:02:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) get_thread_area(&(0x7f0000000040)) 05:02:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000300)=""/180, 0xb4, 0x0, &(0x7f00000003c0)=@abs, 0x6e) 05:02:18 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50236}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000080), &(0x7f0000000280)=0x4) 05:02:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000040)) vmsplice(0xffffffffffffffff, &(0x7f0000000480), 0x0, 0x0) 05:02:18 executing program 4: socket$nl_xfrm(0x10, 0x3, 0x6) nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f0000000040)) 05:02:18 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @dev}, &(0x7f00000000c0)=0x10) [ 376.200649] audit: type=1326 audit(1529730138.199:730): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24058 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000300)=""/180, 0xb4, 0x0, &(0x7f00000003c0)=@abs, 0x6e) 05:02:18 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 05:02:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) get_thread_area(&(0x7f0000000040)) 05:02:18 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50236}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000080), &(0x7f0000000280)=0x4) 05:02:18 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @dev}, &(0x7f00000000c0)=0x10) [ 376.338916] audit: type=1326 audit(1529730138.337:731): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24068 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000040)) vmsplice(0xffffffffffffffff, &(0x7f0000000480), 0x0, 0x0) 05:02:18 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 05:02:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) get_thread_area(&(0x7f0000000040)) 05:02:19 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) 05:02:19 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000080), &(0x7f0000000280)=0x4) 05:02:19 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @dev}, &(0x7f00000000c0)=0x10) 05:02:19 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 05:02:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000040)) vmsplice(0xffffffffffffffff, &(0x7f0000000480), 0x0, 0x0) 05:02:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x5002e}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) get_thread_area(&(0x7f0000000040)) 05:02:19 executing program 4: socket$nl_xfrm(0x10, 0x3, 0x6) nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f0000000040)) [ 377.138497] audit: type=1326 audit(1529730139.137:732): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24098 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:19 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) [ 377.190790] audit: type=1326 audit(1529730139.173:733): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24109 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:19 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000300)=""/180, 0xb4, 0x0, &(0x7f00000003c0)=@abs, 0x6e) 05:02:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x5002e}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) get_thread_area(&(0x7f0000000040)) 05:02:19 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @dev}, &(0x7f00000000c0)=0x10) 05:02:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) vmsplice(0xffffffffffffffff, &(0x7f0000000480), 0x0, 0x0) 05:02:19 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 05:02:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x5002e}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) get_thread_area(&(0x7f0000000040)) [ 377.367003] audit: type=1326 audit(1529730139.365:734): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24123 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) vmsplice(0xffffffffffffffff, &(0x7f0000000480), 0x0, 0x0) 05:02:19 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$nl_xfrm(0x10, 0x3, 0x6) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 05:02:20 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000080), &(0x7f0000000280)=0x4) 05:02:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) getpeername$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @dev}, &(0x7f00000000c0)=0x10) 05:02:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) get_thread_area(&(0x7f0000000040)) 05:02:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$nl_xfrm(0x10, 0x3, 0x6) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 05:02:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) vmsplice(0xffffffffffffffff, &(0x7f0000000480), 0x0, 0x0) 05:02:20 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000080)) 05:02:20 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f0000000040)) 05:02:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$nl_xfrm(0x10, 0x3, 0x6) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) [ 378.105853] audit: type=1326 audit(1529730140.103:735): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24154 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 378.125571] audit: type=1326 audit(1529730140.104:736): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24149 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:20 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000300)=""/180, 0xb4, 0x0, &(0x7f00000003c0)=@abs, 0x6e) 05:02:20 executing program 1: lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000040)) vmsplice(0xffffffffffffffff, &(0x7f0000000480), 0x0, 0x0) 05:02:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) getpeername$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @dev}, &(0x7f00000000c0)=0x10) 05:02:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 05:02:20 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000080)) 05:02:20 executing program 1: lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000040)) vmsplice(0xffffffffffffffff, &(0x7f0000000480), 0x0, 0x0) [ 378.411723] audit: type=1326 audit(1529730140.409:737): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24181 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 05:02:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) getpeername$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @dev}, &(0x7f00000000c0)=0x10) 05:02:21 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000080), &(0x7f0000000280)=0x4) 05:02:21 executing program 1: lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000040)) vmsplice(0xffffffffffffffff, &(0x7f0000000480), 0x0, 0x0) 05:02:21 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000080)) 05:02:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 05:02:21 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @dev}, &(0x7f00000000c0)=0x10) 05:02:21 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f0000000040)) 05:02:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) get_thread_area(&(0x7f0000000040)) 05:02:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$nl_xfrm(0x10, 0x3, 0x6) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) [ 379.112001] audit: type=1326 audit(1529730141.110:738): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24211 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 379.158893] audit: type=1326 audit(1529730141.132:739): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24212 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 379.216191] audit: type=1326 audit(1529730141.214:740): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24216 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:21 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000080)) 05:02:21 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000040)) vmsplice(0xffffffffffffffff, &(0x7f0000000480), 0x0, 0x0) 05:02:21 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @dev}, &(0x7f00000000c0)=0x10) 05:02:21 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000040)=""/232) 05:02:21 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000040)) vmsplice(0xffffffffffffffff, &(0x7f0000000480), 0x0, 0x0) 05:02:21 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @dev}, &(0x7f00000000c0)=0x10) 05:02:21 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000080)) 05:02:21 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000040)) vmsplice(0xffffffffffffffff, &(0x7f0000000480), 0x0, 0x0) 05:02:22 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f0000000040)) 05:02:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000040)=""/232) 05:02:22 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000080)) 05:02:22 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @dev}, &(0x7f00000000c0)=0x10) 05:02:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000040)) vmsplice(0xffffffffffffffff, &(0x7f0000000480), 0x0, 0x0) 05:02:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) clock_gettime(0x0, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000001c0)}, 0x20) 05:02:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) get_thread_area(&(0x7f0000000040)) 05:02:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$nl_xfrm(0x10, 0x3, 0x6) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 05:02:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000040)) vmsplice(0xffffffffffffffff, &(0x7f0000000480), 0x0, 0x0) 05:02:22 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @dev}, &(0x7f00000000c0)=0x10) [ 380.129997] audit: type=1326 audit(1529730142.128:741): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24266 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:22 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000080)) 05:02:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000040)=""/232) 05:02:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) clock_gettime(0x0, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000001c0)}, 0x20) 05:02:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000040)) vmsplice(0xffffffffffffffff, &(0x7f0000000480), 0x0, 0x0) 05:02:22 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @dev}, &(0x7f00000000c0)=0x10) 05:02:22 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000080)) 05:02:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50259}]}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000040)) vmsplice(0xffffffffffffffff, &(0x7f0000000480), 0x0, 0x0) 05:02:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$nl_xfrm(0x10, 0x3, 0x6) nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f0000000040)) 05:02:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) clock_gettime(0x0, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000001c0)}, 0x20) 05:02:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000040)=""/232) 05:02:22 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @dev}, &(0x7f00000000c0)=0x10) 05:02:22 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000080)) 05:02:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) clock_gettime(0x0, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000001c0)}, 0x20) 05:02:23 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @dev}, &(0x7f00000000c0)=0x10) 05:02:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$nl_xfrm(0x10, 0x3, 0x6) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 05:02:23 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000080)) 05:02:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000340), 0x4) 05:02:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50259}]}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000040)) vmsplice(0xffffffffffffffff, &(0x7f0000000480), 0x0, 0x0) 05:02:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]}) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000040)=""/232) 05:02:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000001c0)}, 0x20) 05:02:23 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000080)) 05:02:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50259}]}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000040)) vmsplice(0xffffffffffffffff, &(0x7f0000000480), 0x0, 0x0) 05:02:23 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @dev}, &(0x7f00000000c0)=0x10) 05:02:23 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$nl_xfrm(0x10, 0x3, 0x6) nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f0000000040)) 05:02:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]}) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000040)=""/232) 05:02:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000001c0)}, 0x20) 05:02:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000040)) vmsplice(0xffffffffffffffff, &(0x7f0000000480), 0x0, 0x0) 05:02:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000340), 0x4) 05:02:23 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000080)) 05:02:23 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @dev}, &(0x7f00000000c0)=0x10) 05:02:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000340), 0x4) 05:02:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @dev}, &(0x7f00000000c0)=0x10) 05:02:24 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000080)) 05:02:24 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]}) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000040)=""/232) 05:02:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000001c0)}, 0x20) 05:02:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000080)=@raw, &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f0000000100)=""/4096}, 0x48) semop(0x0, &(0x7f0000001200), 0x0) 05:02:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000080)) 05:02:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @dev}, &(0x7f00000000c0)=0x10) 05:02:24 executing program 5: clock_gettime(0x0, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000001c0)}, 0x20) 05:02:24 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$nl_xfrm(0x10, 0x3, 0x6) nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f0000000040)) 05:02:24 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000040)=""/232) 05:02:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000080)=@raw, &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f0000000100)=""/4096}, 0x48) semop(0x0, &(0x7f0000001200), 0x0) 05:02:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000040)) vmsplice(0xffffffffffffffff, &(0x7f0000000480), 0x0, 0x0) 05:02:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000340), 0x4) 05:02:24 executing program 5: clock_gettime(0x0, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000001c0)}, 0x20) 05:02:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000080)) 05:02:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @dev}, &(0x7f00000000c0)=0x10) 05:02:24 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000040)=""/232) 05:02:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000080)=@raw, &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f0000000100)=""/4096}, 0x48) semop(0x0, &(0x7f0000001200), 0x0) 05:02:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000080)) [ 382.704603] kauditd_printk_skb: 3 callbacks suppressed [ 382.704625] audit: type=1326 audit(1529730144.703:745): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24421 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 382.729813] audit: type=1326 audit(1529730144.709:746): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24417 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:24 executing program 5: clock_gettime(0x0, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000001c0)}, 0x20) 05:02:24 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000040)=""/232) 05:02:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000340), 0x4) 05:02:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000080)=@raw, &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f0000000100)=""/4096}, 0x48) semop(0x0, &(0x7f0000001200), 0x0) 05:02:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000080)) 05:02:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f0000000040)) 05:02:25 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) clock_gettime(0x0, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000001c0)}, 0x20) 05:02:25 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000040)=""/232) 05:02:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000040)) vmsplice(0xffffffffffffffff, &(0x7f0000000480), 0x0, 0x0) 05:02:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000340), 0x4) 05:02:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) semop(0x0, &(0x7f0000001200), 0x0) 05:02:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000080)) 05:02:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @dev}, &(0x7f00000000c0)=0x10) 05:02:25 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) clock_gettime(0x0, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000001c0)}, 0x20) 05:02:25 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000040)=""/232) [ 383.673227] audit: type=1326 audit(1529730145.671:747): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24473 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000080)) 05:02:25 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) clock_gettime(0x0, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000001c0)}, 0x20) 05:02:25 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000040)=""/232) 05:02:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) semop(0x0, &(0x7f0000001200), 0x0) [ 383.735159] audit: type=1326 audit(1529730145.702:748): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24478 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000340), 0x4) 05:02:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)}) clock_gettime(0x0, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000001c0)}, 0x20) 05:02:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f0000000040)) 05:02:26 executing program 2: openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000340), 0x4) 05:02:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000080)) [ 384.234174] audit: type=1326 audit(1529730146.232:749): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24506 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:26 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @dev}, &(0x7f00000000c0)=0x10) 05:02:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000140)}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000040)=""/232) 05:02:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) semop(0x0, &(0x7f0000001200), 0x0) 05:02:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)}) clock_gettime(0x0, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000001c0)}, 0x20) 05:02:26 executing program 2: openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000340), 0x4) 05:02:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) getrlimit(0x0, &(0x7f0000000100)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000180)) [ 384.613015] audit: type=1326 audit(1529730146.611:750): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24515 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000140)}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000040)=""/232) 05:02:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)}) clock_gettime(0x0, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000001c0)}, 0x20) 05:02:26 executing program 2: openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000340), 0x4) 05:02:26 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000080)=@raw, &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f0000000100)=""/4096}, 0x48) semop(0x0, &(0x7f0000001200), 0x0) 05:02:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000140)}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000040)=""/232) 05:02:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) getrlimit(0x0, &(0x7f0000000100)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000180)) 05:02:26 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000340), 0x4) 05:02:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f0000000040)) 05:02:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022d}]}) clock_gettime(0x0, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000001c0)}, 0x20) 05:02:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000080)) [ 385.179629] audit: type=1326 audit(1529730147.178:751): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24562 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:27 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000080)=@raw, &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f0000000100)=""/4096}, 0x48) semop(0x0, &(0x7f0000001200), 0x0) 05:02:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022d}]}) clock_gettime(0x0, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000001c0)}, 0x20) 05:02:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5022b}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000040)=""/232) 05:02:27 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000340), 0x4) 05:02:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) getrlimit(0x0, &(0x7f0000000100)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000180)) 05:02:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f00000001c0)) 05:02:27 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000080)=@raw, &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f0000000100)=""/4096}, 0x48) semop(0x0, &(0x7f0000001200), 0x0) 05:02:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5022b}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000040)=""/232) 05:02:27 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000340), 0x4) 05:02:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022d}]}) clock_gettime(0x0, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000001c0)}, 0x20) 05:02:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) getrlimit(0x0, &(0x7f0000000100)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000180)) 05:02:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f00000001c0)) 05:02:27 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000080)=@raw, &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f0000000100)=""/4096}, 0x48) semop(0x0, &(0x7f0000001200), 0x0) 05:02:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$nl_xfrm(0x10, 0x3, 0x6) nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f0000000040)) 05:02:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5022b}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000040)=""/232) 05:02:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000080)) 05:02:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]}) clock_gettime(0x0, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000001c0)}, 0x20) 05:02:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000340), 0x4) 05:02:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000180)) 05:02:28 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000080)=@raw, &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f0000000100)=""/4096}, 0x48) semop(0x0, &(0x7f0000001200), 0x0) 05:02:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f00000001c0)) 05:02:28 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000040)=""/232) [ 386.034948] audit: type=1326 audit(1529730148.033:752): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24610 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 386.137616] audit: type=1326 audit(1529730148.135:753): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24622 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:28 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000080)=@raw, &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f0000000100)=""/4096}, 0x48) semop(0x0, &(0x7f0000001200), 0x0) 05:02:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000340), 0x4) [ 386.204890] audit: type=1326 audit(1529730148.172:754): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24625 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000180)) 05:02:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f00000001c0)) 05:02:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000080)=@raw, &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f0000000100)=""/4096}, 0x48) semop(0x0, &(0x7f0000001200), 0x0) 05:02:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000340), 0x4) 05:02:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f00000001c0)) 05:02:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000340), 0x4) 05:02:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$nl_xfrm(0x10, 0x3, 0x6) nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f0000000040)) 05:02:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]}) clock_gettime(0x0, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000001c0)}, 0x20) 05:02:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000180)) 05:02:29 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000340), 0x4) 05:02:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000080)=@raw, &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f0000000100)=""/4096}, 0x48) semop(0x0, &(0x7f0000001200), 0x0) 05:02:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000040)=""/232) 05:02:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f00000001c0)) 05:02:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) getgid() 05:02:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000080)=@raw, &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f0000000100)=""/4096}, 0x48) semop(0x0, &(0x7f0000001200), 0x0) 05:02:29 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000340), 0x4) 05:02:29 executing program 1: getrlimit(0x0, &(0x7f0000000100)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000180)) 05:02:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f00000001c0)) 05:02:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50356}]}) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000080)=@raw, &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f0000000100)=""/4096}, 0x48) semop(0x0, &(0x7f0000001200), 0x0) 05:02:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) getgid() 05:02:29 executing program 1: getrlimit(0x0, &(0x7f0000000100)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000180)) 05:02:29 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000340), 0x4) 05:02:29 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$nl_xfrm(0x10, 0x3, 0x6) nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f0000000040)) [ 387.947944] kauditd_printk_skb: 5 callbacks suppressed [ 387.947968] audit: type=1326 audit(1529730149.946:760): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24713 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]}) clock_gettime(0x0, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000001c0)}, 0x20) 05:02:30 executing program 0: openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f00000001c0)) 05:02:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50356}]}) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000080)=@raw, &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f0000000100)=""/4096}, 0x48) semop(0x0, &(0x7f0000001200), 0x0) 05:02:30 executing program 1: getrlimit(0x0, &(0x7f0000000100)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000180)) 05:02:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) getgid() 05:02:30 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000040)=""/232) 05:02:30 executing program 0: openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f00000001c0)) [ 388.081975] audit: type=1326 audit(1529730150.080:761): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24724 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50356}]}) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000080)=@raw, &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f0000000100)=""/4096}, 0x48) semop(0x0, &(0x7f0000001200), 0x0) 05:02:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) getgid() 05:02:30 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) getrlimit(0x0, &(0x7f0000000100)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000180)) [ 388.210554] audit: type=1326 audit(1529730150.209:762): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24731 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:30 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) getrlimit(0x0, &(0x7f0000000100)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000180)) 05:02:30 executing program 0: openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f00000001c0)) 05:02:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000080)=@raw, &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f0000000100)=""/4096}, 0x48) semop(0x0, &(0x7f0000001200), 0x0) 05:02:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) getgid() 05:02:30 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000340), 0x4) [ 388.400969] audit: type=1326 audit(1529730150.399:763): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24748 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 388.495251] audit: type=1326 audit(1529730150.481:764): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24754 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) getgid() 05:02:30 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f00000001c0)) 05:02:30 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) getrlimit(0x0, &(0x7f0000000100)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000180)) 05:02:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) getgid() 05:02:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)) getrlimit(0x0, &(0x7f0000000100)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000180)) 05:02:31 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f00000001c0)) 05:02:31 executing program 7: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) getgid() 05:02:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)) getrlimit(0x0, &(0x7f0000000100)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000180)) 05:02:31 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f00000001c0)) 05:02:31 executing program 7: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) getgid() 05:02:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)) getrlimit(0x0, &(0x7f0000000100)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000180)) 05:02:31 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f00000001c0)) 05:02:31 executing program 7: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) getgid() 05:02:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000080)=@raw, &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f0000000100)=""/4096}, 0x48) semop(0x0, &(0x7f0000001200), 0x0) 05:02:31 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f00000001c0)) 05:02:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000340), 0x4) 05:02:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50356}]}) getrlimit(0x0, &(0x7f0000000100)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000180)) [ 389.397482] audit: type=1326 audit(1529730151.396:765): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24806 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:31 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) getgid() 05:02:31 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f00000001c0)) [ 389.490642] audit: type=1326 audit(1529730151.489:766): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24813 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50356}]}) getrlimit(0x0, &(0x7f0000000100)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000180)) 05:02:31 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) getgid() 05:02:31 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f00000001c0)) 05:02:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50356}]}) getrlimit(0x0, &(0x7f0000000100)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000180)) 05:02:31 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) getgid() 05:02:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) getrlimit(0x0, &(0x7f0000000100)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000180)) 05:02:31 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f00000001c0)) 05:02:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) getgid() 05:02:31 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f00000001c0)) [ 389.777276] audit: type=1326 audit(1529730151.775:767): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24838 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) getgid() 05:02:32 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000080)=@raw, &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f0000000100)=""/4096}, 0x48) semop(0x0, &(0x7f0000001200), 0x0) 05:02:32 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f00000001c0)) 05:02:32 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) getgid() [ 390.324523] audit: type=1326 audit(1529730152.323:768): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24857 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 390.352603] audit: type=1326 audit(1529730152.350:769): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24860 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:32 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) getgid() 05:02:32 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) getgid() 05:02:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x0) 05:02:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) 05:02:32 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000000c0)={0x303, 0x33}, 0x4) 05:02:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000100)) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000280)=""/66, 0x42, 0x0, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 05:02:32 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) getgid() 05:02:32 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) getgid() 05:02:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) getrlimit(0x0, &(0x7f0000000100)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000180)) 05:02:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) 05:02:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000100)) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000280)=""/66, 0x42, 0x0, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 05:02:32 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000000c0)={0x303, 0x33}, 0x4) 05:02:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x0) 05:02:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) 05:02:33 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000000c0)={0x303, 0x33}, 0x4) 05:02:33 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) getuid() getegid() 05:02:33 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x0) 05:02:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000100)) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000280)=""/66, 0x42, 0x0, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 05:02:33 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f00000001c0)) 05:02:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000100)) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000280)=""/66, 0x42, 0x0, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 05:02:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) 05:02:33 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x0) 05:02:33 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000000c0)={0x303, 0x33}, 0x4) 05:02:33 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) getgid() 05:02:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) getrlimit(0x0, &(0x7f0000000100)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000180)) 05:02:33 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) getuid() getegid() 05:02:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000280)=""/66, 0x42, 0x0, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 05:02:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) 05:02:33 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x0) 05:02:33 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000000c0)={0x303, 0x33}, 0x4) 05:02:33 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x0) 05:02:33 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000000c0)={0x303, 0x33}, 0x4) 05:02:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) 05:02:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000280)=""/66, 0x42, 0x0, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 05:02:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f00000001c0)) 05:02:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) getuid() getegid() 05:02:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x0) 05:02:34 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5002e}]}) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000000c0)={0x303, 0x33}, 0x4) 05:02:34 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) 05:02:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) getgid() 05:02:34 executing program 5: syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x0) 05:02:34 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000280)=""/66, 0x42, 0x0, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 05:02:34 executing program 6: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000000c0)={0x303, 0x33}, 0x4) 05:02:34 executing program 4: openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) 05:02:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) getuid() getegid() 05:02:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) getpgrp(0x0) 05:02:34 executing program 4: openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) 05:02:34 executing program 6: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000000c0)={0x303, 0x33}, 0x4) 05:02:34 executing program 5: syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x0) 05:02:34 executing program 2: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000100)) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000280)=""/66, 0x42, 0x0, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 05:02:35 executing program 2: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000100)) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000280)=""/66, 0x42, 0x0, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 05:02:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) getegid() 05:02:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) getpgrp(0x0) 05:02:35 executing program 4: openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) 05:02:35 executing program 5: syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x0) 05:02:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) getegid() 05:02:35 executing program 6: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000000c0)={0x303, 0x33}, 0x4) 05:02:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000300), 0x0) prctl$setname(0xf, &(0x7f0000000000)='\'!wlan1\x00') 05:02:35 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x0) 05:02:35 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) 05:02:35 executing program 2: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000100)) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000280)=""/66, 0x42, 0x0, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 05:02:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) getpgrp(0x0) 05:02:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x1000000000000006, 0x0, 0x0, 0x20000501a1}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) 05:02:35 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x0) 05:02:35 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000100)) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000280)=""/66, 0x42, 0x0, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 05:02:35 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000000c0)={0x303, 0x33}, 0x4) 05:02:35 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) 05:02:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) getegid() 05:02:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) getpgrp(0x0) 05:02:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x1000000000000006, 0x0, 0x0, 0x20000501a1}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) 05:02:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000300), 0x0) prctl$setname(0xf, &(0x7f0000000000)='\'!wlan1\x00') 05:02:35 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x0) 05:02:35 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000000c0)={0x303, 0x33}, 0x4) 05:02:35 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000100)) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000280)=""/66, 0x42, 0x0, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 05:02:35 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) 05:02:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x0) 05:02:36 executing program 3: getuid() getegid() 05:02:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) getpgrp(0x0) 05:02:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)) openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) 05:02:36 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000100)) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000280)=""/66, 0x42, 0x0, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 05:02:36 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000000c0)={0x303, 0x33}, 0x4) 05:02:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x1000000000000006, 0x0, 0x0, 0x20000501a1}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) 05:02:36 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000300), 0x0) prctl$setname(0xf, &(0x7f0000000000)='\'!wlan1\x00') 05:02:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x0) 05:02:36 executing program 3: getuid() getegid() 05:02:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) getpgrp(0x0) 05:02:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)) openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) 05:02:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000100)) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000280)=""/66, 0x42, 0x0, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 05:02:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000000c0)={0x303, 0x33}, 0x4) 05:02:36 executing program 3: getuid() getegid() 05:02:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x0) 05:02:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x1000000000000006, 0x0, 0x0, 0x20000501a1}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) 05:02:36 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000300), 0x0) prctl$setname(0xf, &(0x7f0000000000)='\'!wlan1\x00') 05:02:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000100)) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000280)=""/66, 0x42, 0x0, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 05:02:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)) openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) 05:02:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000000c0)={0x303, 0x33}, 0x4) 05:02:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) getpgrp(0x0) 05:02:36 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) getuid() getegid() 05:02:36 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) prctl$setname(0xf, &(0x7f0000000000)='\'!wlan1\x00') 05:02:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x0) 05:02:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x1000000000000006, 0x0, 0x0, 0x20000501a1}]}) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) 05:02:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000100)) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000280)=""/66, 0x42, 0x0, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 05:02:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505a7}]}) openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) 05:02:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000000c0)={0x303, 0x33}, 0x4) 05:02:36 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) getpgrp(0x0) 05:02:36 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) getuid() getegid() 05:02:37 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x0) 05:02:37 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) prctl$setname(0xf, &(0x7f0000000000)='\'!wlan1\x00') 05:02:37 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x1000000000000006, 0x0, 0x0, 0x20000501a1}]}) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) 05:02:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505a7}]}) openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) 05:02:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x5002e}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000000c0)={0x303, 0x33}, 0x4) 05:02:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000100)) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000280)=""/66, 0x42, 0x0, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 05:02:37 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) getpgrp(0x0) 05:02:37 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) getuid() getegid() 05:02:37 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x0) 05:02:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000100)) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000280)=""/66, 0x42, 0x0, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 05:02:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505a7}]}) openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) 05:02:37 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x1000000000000006, 0x0, 0x0, 0x20000501a1}]}) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) 05:02:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x5002e}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000000c0)={0x303, 0x33}, 0x4) 05:02:37 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) prctl$setname(0xf, &(0x7f0000000000)='\'!wlan1\x00') 05:02:37 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) getpgrp(0x0) 05:02:37 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) getuid() getegid() 05:02:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) 05:02:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x5002e}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000000c0)={0x303, 0x33}, 0x4) 05:02:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000100)) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000280)=""/66, 0x42, 0x0, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 05:02:37 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x0) 05:02:37 executing program 0: pipe2(&(0x7f0000000300), 0x0) prctl$setname(0xf, &(0x7f0000000000)='\'!wlan1\x00') 05:02:37 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) getpgrp(0x0) [ 395.618810] kauditd_printk_skb: 7 callbacks suppressed [ 395.618834] audit: type=1326 audit(1529730157.617:777): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25244 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:37 executing program 7: openat$dir(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) 05:02:37 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) getuid() getegid() [ 395.742509] audit: type=1326 audit(1529730157.682:778): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25250 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000000c0)={0x303, 0x33}, 0x4) 05:02:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000100)) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000280)=""/66, 0x42, 0x0, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 05:02:37 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) getpgrp(0x0) 05:02:37 executing program 0: pipe2(&(0x7f0000000300), 0x0) prctl$setname(0xf, &(0x7f0000000000)='\'!wlan1\x00') 05:02:37 executing program 7: openat$dir(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) 05:02:37 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) getuid() getegid() [ 395.872599] audit: type=1326 audit(1529730157.871:779): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25270 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 395.892475] audit: type=1326 audit(1529730157.873:780): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25268 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:38 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) getpgrp(0x0) 05:02:38 executing program 7: openat$dir(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) 05:02:38 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) 05:02:38 executing program 0: pipe2(&(0x7f0000000300), 0x0) prctl$setname(0xf, &(0x7f0000000000)='\'!wlan1\x00') 05:02:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50030}]}) getuid() getegid() 05:02:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x0) 05:02:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$nl_xfrm(0x10, 0x3, 0x6) getpgrp(0x0) 05:02:38 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x1000000000000006, 0x0, 0x0, 0x20000501a1}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) 05:02:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50030}]}) getuid() getegid() [ 396.552711] audit: type=1326 audit(1529730158.548:781): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25301 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:38 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000300), 0x0) prctl$setname(0xf, &(0x7f0000000000)='\'!wlan1\x00') [ 396.659887] audit: type=1326 audit(1529730158.658:782): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25305 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000000c0)={0x303, 0x33}, 0x4) 05:02:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$nl_xfrm(0x10, 0x3, 0x6) getpgrp(0x0) 05:02:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50030}]}) getuid() getegid() 05:02:38 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x1000000000000006, 0x0, 0x0, 0x20000501a1}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) 05:02:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000100)) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000280)=""/66, 0x42, 0x0, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 05:02:38 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000300), 0x0) prctl$setname(0xf, &(0x7f0000000000)='\'!wlan1\x00') [ 396.861506] audit: type=1326 audit(1529730158.860:783): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25323 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:38 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x1000000000000006, 0x0, 0x0, 0x20000501a1}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) 05:02:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) getuid() getegid() [ 396.927580] audit: type=1326 audit(1529730158.914:784): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25331 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 397.024200] audit: type=1326 audit(1529730158.998:785): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25339 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:39 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000300), 0x0) prctl$setname(0xf, &(0x7f0000000000)='\'!wlan1\x00') 05:02:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) 05:02:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$nl_xfrm(0x10, 0x3, 0x6) getpgrp(0x0) [ 397.506419] audit: type=1326 audit(1529730159.504:786): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25352 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x0) 05:02:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) openat$dir(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) 05:02:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) getpgrp(0x0) 05:02:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}) pipe2(&(0x7f0000000300), 0x0) prctl$setname(0xf, &(0x7f0000000000)='\'!wlan1\x00') 05:02:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}) pipe2(&(0x7f0000000300), 0x0) prctl$setname(0xf, &(0x7f0000000000)='\'!wlan1\x00') 05:02:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) getpgrp(0x0) 05:02:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000100)) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000280)=""/66, 0x42, 0x0, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 05:02:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) openat$dir(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) 05:02:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}) pipe2(&(0x7f0000000300), 0x0) prctl$setname(0xf, &(0x7f0000000000)='\'!wlan1\x00') 05:02:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000000c0)={0x303, 0x33}, 0x4) 05:02:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) openat$dir(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) 05:02:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000300), 0x0) prctl$setname(0xf, &(0x7f0000000000)='\'!wlan1\x00') 05:02:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) getuid() getegid() 05:02:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) getpgrp(0x0) 05:02:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$nl_xfrm(0x10, 0x3, 0x6) getpgrp(0x0) 05:02:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) 05:02:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) 05:02:40 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000300), 0x0) prctl$setname(0xf, &(0x7f0000000000)='\'!wlan1\x00') 05:02:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000080)=0xc) 05:02:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) getpgid(0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue0\x00'}) 05:02:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) 05:02:40 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000300), 0x0) prctl$setname(0xf, &(0x7f0000000000)='\'!wlan1\x00') 05:02:40 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6}]}) pipe2(&(0x7f0000000300), 0x0) prctl$setname(0xf, &(0x7f0000000000)='\'!wlan1\x00') 05:02:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000080)=0xc) 05:02:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) shmdt(0x0) 05:02:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x1000000000000006}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) 05:02:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) getpgid(0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue0\x00'}) 05:02:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) timer_create(0x0, &(0x7f0000000480)={0x0, 0x0, 0x0, @thr={&(0x7f00000002c0), &(0x7f0000000380)}}, &(0x7f00000004c0)) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) 05:02:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) getuid() getegid() 05:02:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000a80)=@nat={'nat\x00', 0x19, 0x5, 0x90, [0x20000280, 0x0, 0x0, 0x200002b0, 0x20000470], 0x0, &(0x7f00000001c0), &(0x7f0000000280)=[{}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x3}]}, 0x108) 05:02:41 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$nl_xfrm(0x10, 0x3, 0x6) getpgrp(0x0) 05:02:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) getpgid(0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue0\x00'}) 05:02:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) timer_create(0x0, &(0x7f0000000480)={0x0, 0x0, 0x0, @thr={&(0x7f00000002c0), &(0x7f0000000380)}}, &(0x7f00000004c0)) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) 05:02:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000080)=0xc) 05:02:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00'}, 0x10) writev(0xffffffffffffffff, &(0x7f0000001340), 0x0) 05:02:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00'}, 0x10) writev(0xffffffffffffffff, &(0x7f0000001340), 0x0) 05:02:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) getpgid(0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue0\x00'}) 05:02:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) timer_create(0x0, &(0x7f0000000480)={0x0, 0x0, 0x0, @thr={&(0x7f00000002c0), &(0x7f0000000380)}}, &(0x7f00000004c0)) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) 05:02:41 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6}]}) pipe2(&(0x7f0000000300), 0x0) prctl$setname(0xf, &(0x7f0000000000)='\'!wlan1\x00') 05:02:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000080)=0xc) 05:02:41 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x1000000000000006}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) 05:02:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue0\x00'}) 05:02:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00'}, 0x10) writev(0xffffffffffffffff, &(0x7f0000001340), 0x0) 05:02:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) timer_create(0x0, &(0x7f0000000480)={0x0, 0x0, 0x0, @thr={&(0x7f00000002c0), &(0x7f0000000380)}}, &(0x7f00000004c0)) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) 05:02:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) 05:02:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000080)=0xc) 05:02:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000040)) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) 05:02:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00'}, 0x10) writev(0xffffffffffffffff, &(0x7f0000001340), 0x0) 05:02:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) 05:02:42 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$nl_xfrm(0x10, 0x3, 0x6) getpgrp(0x0) 05:02:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000080)=0xc) 05:02:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue0\x00'}) 05:02:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue0\x00'}) 05:02:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000080)=0xc) 05:02:42 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6}]}) pipe2(&(0x7f0000000300), 0x0) prctl$setname(0xf, &(0x7f0000000000)='\'!wlan1\x00') 05:02:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) writev(0xffffffffffffffff, &(0x7f0000001340), 0x0) 05:02:42 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x1000000000000006}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) 05:02:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) 05:02:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) 05:02:42 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000080)=0xc) 05:02:42 executing program 5: getpgid(0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue0\x00'}) [ 400.721657] kauditd_printk_skb: 12 callbacks suppressed [ 400.721678] audit: type=1326 audit(1529730162.720:799): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25538 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) writev(0xffffffffffffffff, &(0x7f0000001340), 0x0) 05:02:42 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000080)=0xc) [ 400.834208] audit: type=1326 audit(1529730162.832:800): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25552 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:43 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) writev(0xffffffffffffffff, &(0x7f0000001340), 0x0) 05:02:43 executing program 5: getpgid(0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue0\x00'}) 05:02:43 executing program 2: timer_create(0x0, &(0x7f0000000480)={0x0, 0x0, 0x0, @thr={&(0x7f00000002c0), &(0x7f0000000380)}}, &(0x7f00000004c0)) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) 05:02:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00'}) 05:02:43 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000080)=0xc) 05:02:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000080)=0xc) 05:02:43 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000080)=0xc) 05:02:43 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000080)=0xc) 05:02:43 executing program 5: getpgid(0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue0\x00'}) 05:02:43 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000080)=0xc) 05:02:43 executing program 2: timer_create(0x0, &(0x7f0000000480)={0x0, 0x0, 0x0, @thr={&(0x7f00000002c0), &(0x7f0000000380)}}, &(0x7f00000004c0)) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) 05:02:43 executing program 6: bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00'}, 0x10) writev(0xffffffffffffffff, &(0x7f0000001340), 0x0) 05:02:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000280)=""/103, &(0x7f0000000200)=0x67) 05:02:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00'}) 05:02:43 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) syz_emit_ethernet(0xfe89, &(0x7f0000000000)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @empty, [{[], {0x8100}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @rand_addr}, @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, &(0x7f0000000080)) read(r0, &(0x7f0000000200)=""/126, 0x7e) setsockopt$packet_buf(r0, 0x107, 0x8, &(0x7f0000000040)="f8f550e6", 0x4) read(r0, &(0x7f0000000100)=""/254, 0xfe) 05:02:43 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) getpgid(0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue0\x00'}) 05:02:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000300)) 05:02:43 executing program 6: bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00'}, 0x10) writev(0xffffffffffffffff, &(0x7f0000001340), 0x0) 05:02:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000080)=0xc) 05:02:43 executing program 2: timer_create(0x0, &(0x7f0000000480)={0x0, 0x0, 0x0, @thr={&(0x7f00000002c0), &(0x7f0000000380)}}, &(0x7f00000004c0)) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) 05:02:43 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) getpgid(0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue0\x00'}) 05:02:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00'}) 05:02:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000300)) 05:02:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000280)=""/103, &(0x7f0000000200)=0x67) 05:02:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000080)=0xc) 05:02:44 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) timer_create(0x0, &(0x7f0000000480)={0x0, 0x0, 0x0, @thr={&(0x7f00000002c0), &(0x7f0000000380)}}, &(0x7f00000004c0)) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) 05:02:44 executing program 6: bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00'}, 0x10) writev(0xffffffffffffffff, &(0x7f0000001340), 0x0) 05:02:44 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) getpgid(0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue0\x00'}) 05:02:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00'}) 05:02:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000300)) 05:02:44 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00'}, 0x10) writev(0xffffffffffffffff, &(0x7f0000001340), 0x0) 05:02:44 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) fcntl$getown(0xffffffffffffffff, 0x9) ioprio_get$pid(0x0, 0x0) 05:02:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000080)=0xc) 05:02:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)) getpgid(0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue0\x00'}) 05:02:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000280)=""/103, &(0x7f0000000200)=0x67) 05:02:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000300)) 05:02:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00'}) 05:02:44 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) timer_create(0x0, &(0x7f0000000480)={0x0, 0x0, 0x0, @thr={&(0x7f00000002c0), &(0x7f0000000380)}}, &(0x7f00000004c0)) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) 05:02:44 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00'}, 0x10) writev(0xffffffffffffffff, &(0x7f0000001340), 0x0) 05:02:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)) getpgid(0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue0\x00'}) 05:02:44 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) timer_create(0x0, &(0x7f0000000480)={0x0, 0x0, 0x0, @thr={&(0x7f00000002c0), &(0x7f0000000380)}}, &(0x7f00000004c0)) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) 05:02:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505a7}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000080)=0xc) 05:02:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00'}) 05:02:45 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000280)=""/103, &(0x7f0000000200)=0x67) 05:02:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000300)) 05:02:45 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) fcntl$getown(0xffffffffffffffff, 0x9) ioprio_get$pid(0x0, 0x0) 05:02:45 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505a7}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000080)=0xc) 05:02:45 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00'}, 0x10) writev(0xffffffffffffffff, &(0x7f0000001340), 0x0) 05:02:45 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) timer_create(0x0, &(0x7f0000000480)={0x0, 0x0, 0x0, @thr={&(0x7f00000002c0), &(0x7f0000000380)}}, &(0x7f00000004c0)) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) 05:02:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)) getpgid(0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue0\x00'}) 05:02:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00'}) 05:02:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000300)) 05:02:45 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000280)=""/103, &(0x7f0000000200)=0x67) 05:02:45 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505a7}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000080)=0xc) 05:02:45 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) fcntl$getown(0xffffffffffffffff, 0x9) ioprio_get$pid(0x0, 0x0) 05:02:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00'}, 0x10) writev(0xffffffffffffffff, &(0x7f0000001340), 0x0) 05:02:45 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) timer_create(0x0, &(0x7f0000000480)={0x0, 0x0, 0x0, @thr={&(0x7f00000002c0), &(0x7f0000000380)}}, &(0x7f00000004c0)) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) 05:02:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505a7}]}) getpgid(0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue0\x00'}) 05:02:45 executing program 3: pipe2(&(0x7f0000000040), 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00'}) 05:02:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000300)) 05:02:45 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000280)=""/103, &(0x7f0000000200)=0x67) 05:02:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00'}, 0x10) writev(0xffffffffffffffff, &(0x7f0000001340), 0x0) 05:02:45 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) fcntl$getown(0xffffffffffffffff, 0x9) ioprio_get$pid(0x0, 0x0) 05:02:45 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000080)=0xc) 05:02:45 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) timer_create(0x0, &(0x7f0000000480)={0x0, 0x0, 0x0, @thr={&(0x7f00000002c0), &(0x7f0000000380)}}, &(0x7f00000004c0)) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) 05:02:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505a7}]}) getpgid(0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue0\x00'}) [ 403.769926] audit: type=1326 audit(1529730165.767:801): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25759 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:45 executing program 7: creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000300)) 05:02:45 executing program 3: pipe2(&(0x7f0000000040), 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00'}) 05:02:45 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000280)=""/103, &(0x7f0000000200)=0x67) 05:02:45 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) ioprio_get$pid(0x0, 0x0) 05:02:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00'}, 0x10) writev(0xffffffffffffffff, &(0x7f0000001340), 0x0) [ 403.968597] ================================================================== [ 403.976018] BUG: KMSAN: uninit-value in get_page_from_freelist+0x66c0/0xb740 [ 403.983206] CPU: 0 PID: 25778 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 403.990023] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 403.999356] Call Trace: [ 404.001929] dump_stack+0x185/0x1d0 [ 404.005537] kmsan_report+0x188/0x2a0 [ 404.009322] __msan_warning_32+0x70/0xc0 [ 404.013365] get_page_from_freelist+0x66c0/0xb740 [ 404.018186] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 404.023108] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 404.028455] ? __module_address+0x6a/0x600 [ 404.032676] ? __is_insn_slot_addr+0x198/0x1c0 [ 404.037246] ? kmsan_set_origin_inline+0x6b/0x120 [ 404.042070] ? __msan_poison_alloca+0x15c/0x1d0 [ 404.046734] __alloc_pages_nodemask+0x792/0x5cc0 [ 404.051469] ? kmsan_set_origin_inline+0x6b/0x120 [ 404.056294] ? __msan_poison_alloca+0x15c/0x1d0 [ 404.060940] ? __should_failslab+0x278/0x2a0 [ 404.065346] ? should_fail+0x57/0xab0 [ 404.069127] ? __should_failslab+0x278/0x2a0 [ 404.073514] ? kmsan_set_origin_inline+0x6b/0x120 [ 404.078335] ? __msan_poison_alloca+0x15c/0x1d0 [ 404.082991] ? kmsan_set_origin+0x9e/0x160 [ 404.087211] alloc_pages_vma+0x1555/0x17f0 [ 404.091433] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 404.096521] handle_mm_fault+0x44ca/0x7ed0 [ 404.100734] ? kmsan_set_origin_inline+0x6b/0x120 [ 404.105565] __do_page_fault+0xec6/0x1a10 [ 404.109701] do_page_fault+0xb7/0x250 [ 404.113490] ? page_fault+0x8/0x30 [ 404.117008] page_fault+0x1e/0x30 [ 404.120437] RIP: 0033:0x4075fa [ 404.123605] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 404.128944] RAX: 00000000200001c0 RBX: 0000000000000000 RCX: 0000000000000001 [ 404.136192] RDX: 7a1482cc46b954bc RSI: 0000000000000000 RDI: 0000000001c85848 [ 404.143440] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 404.150690] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000062d20 [ 404.157936] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 404.165189] [ 404.166790] Uninit was stored to memory at: [ 404.171096] kmsan_internal_chain_origin+0x12b/0x210 [ 404.176175] __msan_chain_origin+0x69/0xc0 [ 404.180389] __free_one_page+0x16cb/0x1800 [ 404.184602] __free_pages_ok+0x870/0x1680 [ 404.188728] free_compound_page+0x8e/0xc0 [ 404.192856] free_transhuge_page+0x3bc/0x470 [ 404.197247] release_pages+0x6ff/0x1650 [ 404.201200] free_pages_and_swap_cache+0x55b/0x580 [ 404.206107] unmap_page_range+0x3228/0x3be0 [ 404.210414] unmap_single_vma+0x445/0x5e0 [ 404.214541] unmap_vmas+0x1f4/0x360 [ 404.218144] exit_mmap+0x4d7/0x980 [ 404.221662] __mmput+0x158/0x600 [ 404.225007] mmput+0xab/0xf0 [ 404.228003] exit_mm+0x6ed/0x7a0 [ 404.232347] do_exit+0xc12/0x3930 [ 404.235781] do_group_exit+0x1a0/0x360 [ 404.239647] get_signal+0x1405/0x1ec0 [ 404.243429] do_signal+0xb8/0x1d20 [ 404.246950] prepare_exit_to_usermode+0x271/0x3a0 [ 404.251770] syscall_return_slowpath+0xe9/0x710 [ 404.256424] do_syscall_64+0x1ad/0x230 [ 404.260292] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 404.265456] [ 404.267060] Uninit was created at: [ 404.270584] kmsan_alloc_meta_for_pages+0x161/0x3a0 [ 404.275667] kmsan_alloc_page+0x82/0xe0 [ 404.279621] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 404.284354] alloc_pages_current+0x6b1/0x970 [ 404.288739] __get_free_pages+0x2d/0xc0 [ 404.292692] unmap_page_range+0x26d2/0x3be0 [ 404.296998] unmap_single_vma+0x445/0x5e0 [ 404.301123] unmap_vmas+0x1f4/0x360 [ 404.304731] exit_mmap+0x4d7/0x980 [ 404.308249] __mmput+0x158/0x600 [ 404.311591] mmput+0xab/0xf0 [ 404.314590] exit_mm+0x6ed/0x7a0 [ 404.317934] do_exit+0xc12/0x3930 [ 404.321369] do_group_exit+0x1a0/0x360 [ 404.325234] get_signal+0x1405/0x1ec0 [ 404.329013] do_signal+0xb8/0x1d20 [ 404.332530] prepare_exit_to_usermode+0x271/0x3a0 [ 404.337352] syscall_return_slowpath+0xe9/0x710 [ 404.341997] do_syscall_64+0x1ad/0x230 [ 404.345864] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 404.351026] ================================================================== [ 404.358359] Disabling lock debugging due to kernel taint [ 404.363971] Kernel panic - not syncing: panic_on_warn set ... [ 404.363971] [ 404.371421] CPU: 0 PID: 25778 Comm: syz-executor0 Tainted: G B 4.17.0+ #9 [ 404.379624] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 404.388954] Call Trace: [ 404.391529] dump_stack+0x185/0x1d0 [ 404.395139] panic+0x3d0/0x990 [ 404.398318] kmsan_report+0x29e/0x2a0 [ 404.402100] __msan_warning_32+0x70/0xc0 [ 404.406140] get_page_from_freelist+0x66c0/0xb740 [ 404.410980] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 404.415894] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 404.421240] ? __module_address+0x6a/0x600 [ 404.425459] ? __is_insn_slot_addr+0x198/0x1c0 [ 404.430035] ? kmsan_set_origin_inline+0x6b/0x120 [ 404.434855] ? __msan_poison_alloca+0x15c/0x1d0 [ 404.439509] __alloc_pages_nodemask+0x792/0x5cc0 [ 404.444248] ? kmsan_set_origin_inline+0x6b/0x120 [ 404.449071] ? __msan_poison_alloca+0x15c/0x1d0 [ 404.453718] ? __should_failslab+0x278/0x2a0 [ 404.458107] ? should_fail+0x57/0xab0 [ 404.461885] ? __should_failslab+0x278/0x2a0 [ 404.466271] ? kmsan_set_origin_inline+0x6b/0x120 [ 404.471096] ? __msan_poison_alloca+0x15c/0x1d0 [ 404.475762] ? kmsan_set_origin+0x9e/0x160 [ 404.479992] alloc_pages_vma+0x1555/0x17f0 [ 404.484213] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 404.489300] handle_mm_fault+0x44ca/0x7ed0 [ 404.493513] ? kmsan_set_origin_inline+0x6b/0x120 [ 404.498344] __do_page_fault+0xec6/0x1a10 [ 404.502477] do_page_fault+0xb7/0x250 [ 404.506257] ? page_fault+0x8/0x30 [ 404.509778] page_fault+0x1e/0x30 [ 404.513208] RIP: 0033:0x4075fa [ 404.516375] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 404.521715] RAX: 00000000200001c0 RBX: 0000000000000000 RCX: 0000000000000001 [ 404.528962] RDX: 7a1482cc46b954bc RSI: 0000000000000000 RDI: 0000000001c85848 [ 404.536212] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 404.543462] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000062d20 [ 404.550713] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 405.747164] Shutting down cpus with NMI [ 405.763215] Dumping ftrace buffer: [ 405.766740] (ftrace buffer empty) [ 405.770426] Kernel Offset: disabled [ 405.774033] Rebooting in 86400 seconds..